Sample records for network vulnerability analysis

  1. Topological Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Jajodia, Sushil; Noel, Steven

    Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.

  2. A user exposure based approach for non-structural road network vulnerability analysis

    PubMed Central

    Jin, Lei; Wang, Haizhong; Yu, Le; Liu, Lin

    2017-01-01

    Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i) the rationality of non-structural road network vulnerability, (ii) the metrics for negative consequences accounting for variant road conditions, and (iii) the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for “emotionally hurt” of topological road network. PMID:29176832

  3. Comparison analysis on vulnerability of metro networks based on complex network

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan

    2018-04-01

    This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.

  4. Multiple perspective vulnerability analysis of the power network

    NASA Astrophysics Data System (ADS)

    Wang, Shuliang; Zhang, Jianhua; Duan, Na

    2018-02-01

    To understand the vulnerability of the power network from multiple perspectives, multi-angle and multi-dimensional vulnerability analysis as well as community based vulnerability analysis are proposed in this paper. Taking into account of central China power grid as an example, correlation analysis of different vulnerability models is discussed. Then, vulnerabilities produced by different vulnerability metrics under the given vulnerability models and failure scenarios are analyzed. At last, applying the community detecting approach, critical areas of central China power grid are identified, Vulnerable and robust communities on both topological and functional perspective are acquired and analyzed. The approach introduced in this paper can be used to help decision makers develop optimal protection strategies. It will be also useful to give a multiple vulnerability analysis of the other infrastructure systems.

  5. NV: Nessus Vulnerability Visualization for the Web

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harrison, Lane; Spahn, Riley B; Iannacone, Michael D

    2012-01-01

    Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers.more » We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.« less

  6. Measuring Road Network Vulnerability with Sensitivity Analysis

    PubMed Central

    Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin

    2017-01-01

    This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706

  7. Vulnerability survival analysis: a novel approach to vulnerability management

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Sullivan, John; Cybenko, George

    2017-05-01

    Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    PubMed

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  10. Advanced Fault Diagnosis Methods in Molecular Networks

    PubMed Central

    Habibi, Iman; Emamian, Effat S.; Abdi, Ali

    2014-01-01

    Analysis of the failure of cell signaling networks is an important topic in systems biology and has applications in target discovery and drug development. In this paper, some advanced methods for fault diagnosis in signaling networks are developed and then applied to a caspase network and an SHP2 network. The goal is to understand how, and to what extent, the dysfunction of molecules in a network contributes to the failure of the entire network. Network dysfunction (failure) is defined as failure to produce the expected outputs in response to the input signals. Vulnerability level of a molecule is defined as the probability of the network failure, when the molecule is dysfunctional. In this study, a method to calculate the vulnerability level of single molecules for different combinations of input signals is developed. Furthermore, a more complex yet biologically meaningful method for calculating the multi-fault vulnerability levels is suggested, in which two or more molecules are simultaneously dysfunctional. Finally, a method is developed for fault diagnosis of networks based on a ternary logic model, which considers three activity levels for a molecule instead of the previously published binary logic model, and provides equations for the vulnerabilities of molecules in a ternary framework. Multi-fault analysis shows that the pairs of molecules with high vulnerability typically include a highly vulnerable molecule identified by the single fault analysis. The ternary fault analysis for the caspase network shows that predictions obtained using the more complex ternary model are about the same as the predictions of the simpler binary approach. This study suggests that by increasing the number of activity levels the complexity of the model grows; however, the predictive power of the ternary model does not appear to be increased proportionally. PMID:25290670

  11. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  12. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    PubMed Central

    Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923

  13. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Supriya; Shankar, Mallikarjun

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less

  14. Small vulnerable sets determine large network cascades in power grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.

    The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less

  15. Small vulnerable sets determine large network cascades in power grids

    DOE PAGES

    Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.

    2017-11-17

    The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less

  16. Topological Analysis of Wireless Networks (TAWN)

    DTIC Science & Technology

    2016-05-31

    transmissions from any other node. Definition 1. A wireless network vulnerability is its susceptibility to becoming disconnected when a single source of...19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless

  17. Software-Defined Radio Global System for Mobile Communications Transmitter Development for Heterogeneous Network Vulnerability Testing

    DTIC Science & Technology

    2013-12-01

    AbdelWahab, “ 2G / 3G Inter-RAT Handover Performance Analysis,” Second European Conference on Antennas and Propagation, pp. 1, 8, 11–16, Nov. 2007. [19] J...RADIO GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING by Carson C. McAbee... MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING 5. FUNDING NUMBERS 6. AUTHOR(S) Carson C. McAbee

  18. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less

  19. Topological robustness analysis of protein interaction networks reveals key targets for overcoming chemotherapy resistance in glioma

    NASA Astrophysics Data System (ADS)

    Azevedo, Hátylas; Moreira-Filho, Carlos Alberto

    2015-11-01

    Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.

  20. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  1. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  2. Real-time network security situation visualization and threat assessment based on semi-Markov process

    NASA Astrophysics Data System (ADS)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  3. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  4. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  5. Structural vulnerability of the French swine industry trade network to the spread of infectious diseases.

    PubMed

    Rautureau, S; Dufour, B; Durand, B

    2012-07-01

    The networks generated by live animal movements are the principal vector for the propagation of infectious agents between farms, and their topology strongly affects how fast a disease may spread. The structural characteristics of networks may thus provide indicators of network vulnerability to the spread of infectious disease. This study applied social network analysis methods to describe the French swine trade network. Initial analysis involved calculating several parameters to characterize networks and then identifying high-risk subgroups of holdings for different time scales. Holding-specific centrality measurements ('degree', 'betweenness' and 'ingoing infection chain'), which summarize the place and the role of holdings in the network, were compared according to the production type. In addition, network components and communities, areas where connectedness is particularly high and could influence the speed and the extent of a disease, were identified and analysed. Dealer holdings stood out because of their high centrality values suggesting that these holdings may control the flow of animals in part of the network. Herds with growing units had higher values for degree and betweenness centrality, representing central positions for both spreading and receiving disease, whereas herds with finishing units had higher values for in-degree and ingoing infection chain centrality values and appeared more vulnerable with many contacts through live animal movements and thus at potentially higher risk for introduction of contagious diseases. This reflects the dynamics of the swine trade with downward movements along the production chain. But, the significant heterogeneity of farms with several production units did not reveal any particular type of production for targeting disease surveillance or control. Besides, no giant strong connected component was observed, the network being rather organized according to communities of small or medium size (<20% of network size). Because of this fragmentation, the swine trade network appeared less structurally vulnerable than ruminant trade networks. This fragmentation is explained by the hierarchical structure, which thus limits the structural vulnerability of the global trade network. However, inside communities, the hierarchical structure of the swine production system would favour the spread of an infectious agent (especially if introduced in breeding herds).

  6. Vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  7. A preliminary analysis of quantifying computer security vulnerability data in "the wild"

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George

    2016-05-01

    A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.

  8. Assessing the impact of vulnerability on perceptions of social cohesion in the context of community resilience to disaster in the Blue Mountains.

    PubMed

    Redshaw, Sarah; Ingham, Valerie; McCutcheon, Marion; Hicks, John; Burmeister, Oliver

    2018-02-01

    To assess the impact of network communications, community participation and elements of vulnerability on the perception of social cohesiveness in the Blue Mountains local government area (Blue Mountains LGA). A questionnaire was administered to residents of the Blue Mountains LGA. Econometric analysis of the resulting data was undertaken. Blue Mountains LGA, Australia. One thousand one hundred and three residents of the Blue Mountains LGA responded to the questionnaire. The responses enabled the construction of variables measuring individual perceptions of community cohesiveness, their network communications and community participation. Demographic data and data on the vulnerabilities of individuals were also collected. The data were used in an econometric model which identified that network communications and community participation impacted positively on perceptions of social cohesiveness while vulnerability factors had a negative impact. Remedial action to build community cohesiveness and network communications can be expected to have a positive impact on social cohesiveness. In developing strategies to build community cohesiveness and network communication, particular care needs to be taken to ensure the inclusion of those members of society who are regarded as the most vulnerable. © 2017 National Rural Health Alliance Inc.

  9. Culture, social networks and HIV vulnerability among men who have sex with men in Indonesia.

    PubMed

    Fauk, Nelsensius Klau; Merry, Maria Silvia; Sigilipoe, Mitra Andhini; Putra, Sukma; Mwanri, Lillian

    2017-01-01

    The current study aimed to explore cultural and social network influence on HIV vulnerability among Men who have Sex with Men (MSM) population in Yogyakarta, Indonesia. A qualitative inquiry employing in-depth one-on-one interviews was carried out with 24 MSM participants in July 2015. Data were analysed using a framework analysis and guided by the Social Networks Theory (SNT) as a conceptual framework. Findings indicated that prohibitive cultural perspectives and norms against same-sex marriage made them to conceal their sexual orientation and thus secretively engaging in unprotected sex that increased their predisposition to HIV transmission. The prohibitive cultures were also instrumental in the formation of MSM sexual networks that provided supportive environment for HIV-risky sexual practices among network partners. These findings provide information that can be used to improve HIV/AIDS service practices and policies. However, further studies with large numbers of MSM would be needed to improve the understanding of other HIV vulnerability determinants, the unique needs of MSM, and what and how programs could be conducted to reduce HIV vulnerability among MSM population.

  10. Vulnerability Analysis and Passenger Source Prediction in Urban Rail Transit Networks

    PubMed Central

    Wang, Junjie; Li, Yishuai; Liu, Jingyu; He, Kun; Wang, Pu

    2013-01-01

    Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT) ODs (origin-destination matrix) were estimated and the most vulnerable URT segments, those capable of causing the largest service interruptions, were identified. In both URT networks, a few highly vulnerable segments were observed. For this small group of vital segments, the impact of failure must be carefully evaluated. A bipartite URT usage network was developed and used to determine the inherent connections between urban rail transits and their passengers' travel demands. Although passengers' origins and destinations were easy to locate for a large number of URT segments, a few show very complicated spatial distributions. Based on the bipartite URT usage network, a new layer of the understanding of a URT segment's vulnerability can be achieved by taking the difficulty of addressing the failure of a given segment into account. Two proof-of-concept cases are described here: Possible transfer of passenger flow to the road network is here predicted in the cases of failures of two representative URT segments in San Francisco. PMID:24260355

  11. Grid Transmission Expansion Planning Model Based on Grid Vulnerability

    NASA Astrophysics Data System (ADS)

    Tang, Quan; Wang, Xi; Li, Ting; Zhang, Quanming; Zhang, Hongli; Li, Huaqiang

    2018-03-01

    Based on grid vulnerability and uniformity theory, proposed global network structure and state vulnerability factor model used to measure different grid models. established a multi-objective power grid planning model which considering the global power network vulnerability, economy and grid security constraint. Using improved chaos crossover and mutation genetic algorithm to optimize the optimal plan. For the problem of multi-objective optimization, dimension is not uniform, the weight is not easy given. Using principal component analysis (PCA) method to comprehensive assessment of the population every generation, make the results more objective and credible assessment. the feasibility and effectiveness of the proposed model are validated by simulation results of Garver-6 bus system and Garver-18 bus.

  12. Drivers and Pattern of Social Vulnerability to Flood in Metropolitan Lagos, Nigeria

    NASA Astrophysics Data System (ADS)

    Fasona, M.

    2016-12-01

    Lagos is Africa's second largest city and a city-state in southwest Nigeria. Population and economic activities in the city are concentrated in the greater Lagos metropolitan area - a group of barrier islands less than a thousand square kilometer. Several physical factors and critical human-environmental conditions contribute to high flood vulnerability across the city. Flood impact is highly denominated and the poor tend to suffer more due to higher risk of exposure and poor adaptive capacity. In this study we present the pattern of social vulnerability to flooding across the Lagos metropolis and argued that the pattern substantially reflects the pattern and severity of flooding impact on people across the metropolis. Twenty nine social indicators and experiences including poverty profile, housing conditions, education, population and demography, social network, and communication, among others, were considered. The data were collated through field survey and subjected to principal component analysis. The results were processed into raster surfaces using GIS for social vulnerability characterization at neighborhood levels. The results suggest the social status indicators, neighborhood standing and social networks indictors, the indicators of emergency responses and security, and the neighborhood conditions, in that order, are the most important determinants of social vulnerability. Six of the 16 LGAs in metropolitan Lagos have high social vulnerability. Neighborhoods that combine poor social status indicators and poor neighborhood standing and social networks are found to have high social vulnerability whereas other poor neighborhoods with strong social networks performed better. We conclude that improved human living condition and social network and communication in poor urban neighborhoods are important to reducing social vulnerability to flooding in the metropolis.

  13. Construction of road network vulnerability evaluation index based on general travel cost

    NASA Astrophysics Data System (ADS)

    Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin

    2018-03-01

    With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.

  14. Vulnerability analysis methods for road networks

    NASA Astrophysics Data System (ADS)

    Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš

    2014-05-01

    Road networks rank among the most important lifelines of modern society. They can be damaged by either random or intentional events. Roads are also often affected by natural hazards, the impacts of which are both direct and indirect. Whereas direct impacts (e.g. roads damaged by a landslide or due to flooding) are localized in close proximity to the natural hazard occurrence, the indirect impacts can entail widespread service disabilities and considerable travel delays. The change in flows in the network may affect the population living far from the places originally impacted by the natural disaster. These effects are primarily possible due to the intrinsic nature of this system. The consequences and extent of the indirect costs also depend on the set of road links which were damaged, because the road links differ in terms of their importance. The more robust (interconnected) the road network is, the less time is usually needed to secure the serviceability of an area hit by a disaster. These kinds of networks also demonstrate a higher degree of resilience. Evaluating road network structures is therefore essential in any type of vulnerability and resilience analysis. There are a range of approaches used for evaluation of the vulnerability of a network and for identification of the weakest road links. Only few of them are, however, capable of simulating the impacts of the simultaneous closure of numerous links, which often occurs during a disaster. The primary problem is that in the case of a disaster, which usually has a large regional extent, the road network may remain disconnected. The majority of the commonly used indices use direct computation of the shortest paths or time between OD (origin - destination) pairs and therefore cannot be applied when the network breaks up into two or more components. Since extensive break-ups often occur in cases of major disasters, it is important to study the network vulnerability in these cases as well, so that appropriate steps can be taken in order to make it more resilient. Performing such an analysis of network break-ups requires consideration of the network as a whole, ideally identifying all the cases generated by simultaneous closure of multiple links and evaluating them using various criteria. The spatial distribution of settlements, important companies and the overall population in the nodes of the network are several factors, apart from the topology of the network which could be taken into account when computing vulnerability indices and identifying the weakest links and/or weakest link combinations. However, even for small networks (i.e., hundreds of nodes and links), the problem of break-up identification becomes extremely difficult to resolve. The naive approaches of the brute force examination consequently fail and more elaborated algorithms have to be applied. We address the problem of evaluating the vulnerability of road networks in our work by simulating the impacts of the simultaneous closure of multiple roads/links. We present an ongoing work on a sophisticated algorithm focused on the identification of network break-ups and evaluating them by various criteria.

  15. Biomarker microRNAs for prostate cancer metastasis: screened with a network vulnerability analysis model.

    PubMed

    Lin, Yuxin; Chen, Feifei; Shen, Li; Tang, Xiaoyu; Du, Cui; Sun, Zhandong; Ding, Huijie; Chen, Jiajia; Shen, Bairong

    2018-05-21

    Prostate cancer (PCa) is a fatal malignant tumor among males in the world and the metastasis is a leading cause for PCa death. Biomarkers are therefore urgently needed to detect PCa metastatic signature at the early time. MicroRNAs are small non-coding RNAs with the potential to be biomarkers for disease prediction. In addition, computer-aided biomarker discovery is now becoming an attractive paradigm for precision diagnosis and prognosis of complex diseases. In this study, we identified key microRNAs as biomarkers for predicting PCa metastasis based on network vulnerability analysis. We first extracted microRNAs and mRNAs that were differentially expressed between primary PCa and metastatic PCa (MPCa) samples. Then we constructed the MPCa-specific microRNA-mRNA network and screened microRNA biomarkers by a novel bioinformatics model. The model emphasized the characterization of systems stability changes and the network vulnerability with three measurements, i.e. the structurally single-line regulation, the functional importance of microRNA targets and the percentage of transcription factor genes in microRNA unique targets. With this model, we identified five microRNAs as putative biomarkers for PCa metastasis. Among them, miR-101-3p and miR-145-5p have been previously reported as biomarkers for PCa metastasis and the remaining three, i.e. miR-204-5p, miR-198 and miR-152, were screened as novel biomarkers for PCa metastasis. The results were further confirmed by the assessment of their predictive power and biological function analysis. Five microRNAs were identified as candidate biomarkers for predicting PCa metastasis based on our network vulnerability analysis model. The prediction performance, literature exploration and functional enrichment analysis convinced our findings. This novel bioinformatics model could be applied to biomarker discovery for other complex diseases.

  16. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  17. Vulnerability of countries to food-production crises propagating in the virtual water trade network

    NASA Astrophysics Data System (ADS)

    Tamea, S.; Laio, F.; Ridolfi, L.

    2015-12-01

    In recent years, the international trade of food and agricultural commodities has undergone a marked increase of exchanged volumes and an expansion of the trade network. This globalization of trade has both positive and negative effects, but the interconnectedness and external dependency of countries generate complex dynamics which are often difficult to understand and model. In this study we consider the volume of water used for the production of agricultural commodities, virtually exchanged among countries through commodity trade, i.e. the virtual water trade. Then, we set up a parsimonious mechanistic model describing the propagation, into the global trade network, of food-production crises generated locally by a social, economic or environmental event (such as war, economic crisis, drought, pest). The model, accounting for the network structure and the virtual water balance of all countries, bases on rules derived from observed virtual water flows and on data-based and statistically verified assumption. It is also tested on real case studies that prove its capability to capture the main features of crises propagation. The model is then employed as the basis for the development of an index of country vulnerability, measuring the exposure of countries to crises propagating in the virtual water trade network. Results of the analysis are discussed within the context of socio-economic and environmental conditions of countries, showing that not only water-scarce, but also wealthy and globalized countries, are among the most vulnerable to external crises. The temporal analysis for the period 1986-2011 reveals that the global average vulnerability has strongly increased over time, confirming the increased exposure of countries to external crises which may occur in the virtual water trade network.

  18. Developing an intelligence analysis process through social network analysis

    NASA Astrophysics Data System (ADS)

    Waskiewicz, Todd; LaMonica, Peter

    2008-04-01

    Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.

  19. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  20. Network Financial Support and Conflict as Predictors of Depressive Symptoms among a Highly Disadvantaged Population

    ERIC Educational Resources Information Center

    Knowlton, Amy R.; Latkin, Carl A.

    2007-01-01

    The study examined multiple dimensions of social support as predictors of depressive symptoms among a highly vulnerable population. Social network analysis was used to assess perceived and enacted dimensions of support (emotional, financial, instrumental), network conflict, closeness, and composition. Participants were 393 current and former…

  1. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    DOT National Transportation Integrated Search

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  2. Network topology and resilience analysis of South Korean power grid

    NASA Astrophysics Data System (ADS)

    Kim, Dong Hwan; Eisenberg, Daniel A.; Chun, Yeong Han; Park, Jeryang

    2017-01-01

    In this work, we present topological and resilience analyses of the South Korean power grid (KPG) with a broad voltage level. While topological analysis of KPG only with high-voltage infrastructure shows an exponential degree distribution, providing another empirical evidence of power grid topology, the inclusion of low voltage components generates a distribution with a larger variance and a smaller average degree. This result suggests that the topology of a power grid may converge to a highly skewed degree distribution if more low-voltage data is considered. Moreover, when compared to ER random and BA scale-free networks, the KPG has a lower efficiency and a higher clustering coefficient, implying that highly clustered structure does not necessarily guarantee a functional efficiency of a network. Error and attack tolerance analysis, evaluated with efficiency, indicate that the KPG is more vulnerable to random or degree-based attacks than betweenness-based intentional attack. Cascading failure analysis with recovery mechanism demonstrates that resilience of the network depends on both tolerance capacity and recovery initiation time. Also, when the two factors are fixed, the KPG is most vulnerable among the three networks. Based on our analysis, we propose that the topology of power grids should be designed so the loads are homogeneously distributed, or functional hubs and their neighbors have high tolerance capacity to enhance resilience.

  3. Vulnerability of networks of interacting Markov chains.

    PubMed

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  4. Dynamics of subway networks based on vehicles operation timetable

    NASA Astrophysics Data System (ADS)

    Xiao, Xue-mei; Jia, Li-min; Wang, Yan-hui

    2017-05-01

    In this paper, a subway network is represented as a dynamic, directed and weighted graph, in which vertices represent subway stations and weights of edges represent the number of vehicles passing through the edges by considering vehicles operation timetable. Meanwhile the definitions of static and dynamic metrics which can represent vertices' and edges' local and global attributes are proposed. Based on the model and metrics, standard deviation is further introduced to study the dynamic properties (heterogeneity and vulnerability) of subway networks. Through a detailed analysis of the Beijing subway network, we conclude that with the existing network structure, the heterogeneity and vulnerability of the Beijing subway network varies over time when the vehicle operation timetable is taken into consideration, and the distribution of edge weights affects the performance of the network. In other words, although the vehicles operation timetable is restrained by the physical structure of the network, it determines the performances and properties of the Beijing subway network.

  5. Vulnerability of animal trade networks to the spread of infectious diseases: a methodological approach applied to evaluation and emergency control strategies in cattle, France, 2005.

    PubMed

    Rautureau, S; Dufour, B; Durand, B

    2011-04-01

    Besides farming, trade of livestock is a major component of agricultural economy. However, the networks generated by live animal movements are the major support for the propagation of infectious agents between farms, and their structure strongly affects how fast a disease may spread. Structural characteristics may thus be indicators of network vulnerability to the spread of infectious disease. The method proposed here is based upon the analysis of specific subnetworks: the giant strongly connected components (GSCs). Their existence, size and geographic extent are used to assess network vulnerability. Their disappearance when targeted nodes are removed allows studying how network vulnerability may be controlled under emergency conditions. The method was applied to the cattle trade network in France, 2005. Giant strongly connected components were present and widely spread all over the country in yearly, monthly and weekly networks. Among several tested approaches, the most efficient way to make GSCs disappear was based on the ranking of nodes by decreasing betweenness centrality (the proportion of shortest paths between nodes on which a specific node lies). Giant strongly connected components disappearance was obtained after removal of <1% of network nodes. Under emergency conditions, suspending animal trade activities in a small subset of holdings may thus allow to control the spread of an infectious disease through the animal trade network. Nodes representing markets and dealers were widely affected by these simulated control measures. This confirms their importance as 'hubs' for infectious diseases spread. Besides emergency conditions, specific sensitization and preventive measures should be dedicated to this population. © 2010 Blackwell Verlag GmbH.

  6. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pollet, J.

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less

  7. [Mapping environmental vulnerability from ETM + data in the Yellow River Mouth Area].

    PubMed

    Wang, Rui-Yan; Yu, Zhen-Wen; Xia, Yan-Ling; Wang, Xiang-Feng; Zhao, Geng-Xing; Jiang, Shu-Qian

    2013-10-01

    The environmental vulnerability retrieval is important to support continuing data. The spatial distribution of regional environmental vulnerability was got through remote sensing retrieval. In view of soil and vegetation, the environmental vulnerability evaluation index system was built, and the environmental vulnerability of sampling points was calculated by the AHP-fuzzy method, then the correlation between the sampling points environmental vulnerability and ETM + spectral reflectance ratio including some kinds of conversion data was analyzed to determine the sensitive spectral parameters. Based on that, models of correlation analysis, traditional regression, BP neural network and support vector regression were taken to explain the quantitative relationship between the spectral reflectance and the environmental vulnerability. With this model, the environmental vulnerability distribution was retrieved in the Yellow River Mouth Area. The results showed that the correlation between the environmental vulnerability and the spring NDVI, the September NDVI and the spring brightness was better than others, so they were selected as the sensitive spectral parameters. The model precision result showed that in addition to the support vector model, the other model reached the significant level. While all the multi-variable regression was better than all one-variable regression, and the model accuracy of BP neural network was the best. This study will serve as a reliable theoretical reference for the large spatial scale environmental vulnerability estimation based on remote sensing data.

  8. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  9. Networking in Education: From Concept to Action--An Analytical View on the Educational Territories of Priority Intervention (TEIP) in Northern Portugal

    ERIC Educational Resources Information Center

    Silva, Marisa; da Silva, Sofia Marques; Araújo, Helena C

    2017-01-01

    This article presents an analysis of school principals' perspectives on networking concerning schools and school clusters from areas of social vulnerability (Educational Territories of Priority Intervention (TEIP)) in Northern Portugal. The meanings, purpose, benefits and difficulties of networking in education are examined, based on interviews…

  10. Vulnerability Analysis and Evaluation of Urban Road System in Tianjin

    NASA Astrophysics Data System (ADS)

    Liu, Y. Q.; Wu, X.

    In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.

  11. Analysis of Network Address Shuffling as a Moving Target Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Crouse, Michael B.; Fulp, Errin W.

    2014-06-10

    Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances it is a viable moving target defense. This paper introduces probabilistic models that can provide insight into the performance of address shuffling. These models quantify the probability of attacker success in terms of network size, quantity of addresses scanned,more » quantity of vulnerable systems, and the frequency of shuffling. Theoretical analysis will show that shuffling is an acceptable defense if there is a small population of vulnerable systems within a large network address space, however shuffling has a cost for legitimate users. These results will also be shown empirically using simulation and actual traffic traces.« less

  12. Network Exploration and Vulnerability Assessment Using a Combined Blackbox and Whitebox Analysis Approach

    DTIC Science & Technology

    2010-03-01

    Employ NetFlow on Edge Router ......................................... 45 E. IMPLEMENT AN INTEGRATED VULNERABILITY ASSESSMENT. 48 1. Conduct...45 Figure 18. Netflow Information on Unauthorized Connections ............................ 46 Figure 19. Algorithm for Detecting...indicating that an attack has being initiated from this port. Figure 17. Information on Traffic Generated by Suspicious Host 3. Employ NetFlow

  13. Why do vulnerability cycles matter in financial networks?

    NASA Astrophysics Data System (ADS)

    Silva, Thiago Christiano; Tabak, Benjamin Miranda; Guerra, Solange Maria

    2017-04-01

    We compare two widely employed models that estimate systemic risk: DebtRank and Differential DebtRank. We show that not only network cyclicality but also the average vulnerability of banks are essential concepts that contribute to widening the gap in the systemic risk estimates of both approaches. We find that systemic risk estimates are the same whenever the network has no cycles. However, in case the network presents cyclicality, then we need to inspect the average vulnerability of banks to estimate the underestimation gap. We find that the gap is small regardless of the cyclicality of the network when its average vulnerability is large. In contrast, the observed gap follows a quadratic behavior when the average vulnerability is small or intermediate. We show results using an econometric exercise and draw guidelines both on artificial and real-world financial networks.

  14. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

    PubMed

    Gou, Li; Wei, Bo; Sadiq, Rehan; Sadiq, Yong; Deng, Yong

    2016-01-01

    With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

  15. An Analysis of Botnet Vulnerabilities

    DTIC Science & Technology

    2007-06-01

    Definition Currently, the primary defense against botnets is prompt patching of vulnerable systems and antivirus software . Network monitoring can identify...IRCd software , none were identified during this effort. AFIT iv For my wife, for her caring and support throughout the course of this...are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online

  16. Assessment of Critical Events Corridors through Multivariate Cascading Outages Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Makarov, Yuri V.; Samaan, Nader A.; Diao, Ruisheng

    2011-10-17

    Massive blackouts of electrical power systems in North America over the past decade has focused increasing attention upon ways to identify and simulate network events that may potentially lead to widespread network collapse. This paper summarizes a method to simulate power-system vulnerability to cascading failures to a supplied set of initiating events synonymously termed as Extreme Events. The implemented simulation method is currently confined to simulating steady state power-system response to a set of extreme events. The outlined method of simulation is meant to augment and provide a new insight into bulk power transmission network planning that at present remainsmore » mainly confined to maintaining power system security for single and double component outages under a number of projected future network operating conditions. Although one of the aims of this paper is to demonstrate the feasibility of simulating network vulnerability to cascading outages, a more important goal has been to determine vulnerable parts of the network that may potentially be strengthened in practice so as to mitigate system susceptibility to cascading failures. This paper proposes to demonstrate a systematic approach to analyze extreme events and identify vulnerable system elements that may be contributing to cascading outages. The hypothesis of critical events corridors is proposed to represent repeating sequential outages that can occur in the system for multiple initiating events. The new concept helps to identify system reinforcements that planners could engineer in order to 'break' the critical events sequences and therefore lessen the likelihood of cascading outages. This hypothesis has been successfully validated with a California power system model.« less

  17. Graph modeling systems and methods

    DOEpatents

    Neergaard, Mike

    2015-10-13

    An apparatus and a method for vulnerability and reliability modeling are provided. The method generally includes constructing a graph model of a physical network using a computer, the graph model including a plurality of terminating vertices to represent nodes in the physical network, a plurality of edges to represent transmission paths in the physical network, and a non-terminating vertex to represent a non-nodal vulnerability along a transmission path in the physical network. The method additionally includes evaluating the vulnerability and reliability of the physical network using the constructed graph model, wherein the vulnerability and reliability evaluation includes a determination of whether each terminating and non-terminating vertex represents a critical point of failure. The method can be utilized to evaluate wide variety of networks, including power grid infrastructures, communication network topologies, and fluid distribution systems.

  18. Selective impairment of hippocampus and posterior hub areas in Alzheimer's disease: an MEG-based multiplex network study.

    PubMed

    Yu, Meichen; Engels, Marjolein M A; Hillebrand, Arjan; van Straaten, Elisabeth C W; Gouw, Alida A; Teunissen, Charlotte; van der Flier, Wiesje M; Scheltens, Philip; Stam, Cornelis J

    2017-05-01

    Although frequency-specific network analyses have shown that functional brain networks are altered in patients with Alzheimer's disease, the relationships between these frequency-specific network alterations remain largely unknown. Multiplex network analysis is a novel network approach to study complex systems consisting of subsystems with different types of connectivity patterns. In this study, we used magnetoencephalography to integrate five frequency-band specific brain networks in a multiplex framework. Previous structural and functional brain network studies have consistently shown that hub brain areas are selectively disrupted in Alzheimer's disease. Accordingly, we hypothesized that hub regions in the multiplex brain networks are selectively targeted in patients with Alzheimer's disease in comparison to healthy control subjects. Eyes-closed resting-state magnetoencephalography recordings from 27 patients with Alzheimer's disease (60.6 ± 5.4 years, 12 females) and 26 controls (61.8 ± 5.5 years, 14 females) were projected onto atlas-based regions of interest using beamforming. Subsequently, source-space time series for both 78 cortical and 12 subcortical regions were reconstructed in five frequency bands (delta, theta, alpha 1, alpha 2 and beta band). Multiplex brain networks were constructed by integrating frequency-specific magnetoencephalography networks. Functional connections between all pairs of regions of interests were quantified using a phase-based coupling metric, the phase lag index. Several multiplex hub and heterogeneity metrics were computed to capture both overall importance of each brain area and heterogeneity of the connectivity patterns across frequency-specific layers. Different nodal centrality metrics showed consistently that several hub regions, particularly left hippocampus, posterior parts of the default mode network and occipital regions, were vulnerable in patients with Alzheimer's disease compared to control subjects. Of note, these detected vulnerable hubs in Alzheimer's disease were absent in each individual frequency-specific network, thus showing the value of integrating the networks. The connectivity patterns of these vulnerable hub regions in the patients were heterogeneously distributed across layers. Perturbed cognitive function and abnormal cerebrospinal fluid amyloid-β42 levels correlated positively with the vulnerability of the hub regions in patients with Alzheimer's disease. Our analysis therefore demonstrates that the magnetoencephalography-based multiplex brain networks contain important information that cannot be revealed by frequency-specific brain networks. Furthermore, this indicates that functional networks obtained in different frequency bands do not act as independent entities. Overall, our multiplex network study provides an effective framework to integrate the frequency-specific networks with different frequency patterns and reveal neuropathological mechanism of hub disruption in Alzheimer's disease. © The Author (2017). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Brain network alterations and vulnerability to simulated neurodegeneration in breast cancer.

    PubMed

    Kesler, Shelli R; Watson, Christa L; Blayney, Douglas W

    2015-08-01

    Breast cancer and its treatments are associated with mild cognitive impairment and brain changes that could indicate an altered or accelerated brain aging process. We applied diffusion tensor imaging and graph theory to measure white matter organization and connectivity in 34 breast cancer survivors compared with 36 matched healthy female controls. We also investigated how brain networks (connectomes) in each group responded to simulated neurodegeneration based on network attack analysis. Compared with controls, the breast cancer group demonstrated significantly lower fractional anisotropy, altered small-world connectome properties, lower brain network tolerance to systematic region (node), and connection (edge) attacks and significant cognitive impairment. Lower tolerance to network attack was associated with cognitive impairment in the breast cancer group. These findings provide further evidence of diffuse white matter pathology after breast cancer and extend the literature in this area with unique data demonstrating increased vulnerability of the post-breast cancer brain network to future neurodegenerative processes. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Lack of security of networked medical equipment in radiology.

    PubMed

    Moses, Vinu; Korah, Ipeson

    2015-02-01

    OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.

  1. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  2. Cognitive Vulnerability to Major Depression: View from the Intrinsic Network and Cross-network Interactions

    PubMed Central

    Wang, Xiang; Öngür, Dost; Auerbach, Randy P.; Yao, Shuqiao

    2016-01-01

    Abstract Although it is generally accepted that cognitive factors contribute to the pathogenesis of major depressive disorder (MDD), there are missing links between behavioral and biological models of depression. Nevertheless, research employing neuroimaging technologies has elucidated some of the neurobiological mechanisms related to cognitive-vulnerability factors, especially from a whole-brain, dynamic perspective. In this review, we integrate well-established cognitive-vulnerability factors for MDD and corresponding neural mechanisms in intrinsic networks using a dual-process framework. We propose that the dynamic alteration and imbalance among the intrinsic networks, both in the resting-state and the rest-task transition stages, contribute to the development of cognitive vulnerability and MDD. Specifically, we propose that abnormally increased resting-state default mode network (DMN) activity and connectivity (mainly in anterior DMN regions) contribute to the development of cognitive vulnerability. Furthermore, when subjects confront negative stimuli in the period of rest-to-task transition, the following three kinds of aberrant network interactions have been identified as facilitators of vulnerability and dysphoric mood, each through a different cognitive mechanism: DMN dominance over the central executive network (CEN), an impaired salience network–mediated switching between the DMN and CEN, and ineffective CEN modulation of the DMN. This focus on interrelated networks and brain-activity changes between rest and task states provides a neural-system perspective for future research on cognitive vulnerability and resilience, and may potentially guide the development of new intervention strategies for MDD. PMID:27148911

  3. Report: Results of Technical Network Vulnerability Assessment: EPA’s Erlanger Building

    EPA Pesticide Factsheets

    Report #10-P-0211, September 7, 2010. Vulnerability testing of EPA’s Erlanger Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  4. Report: Results of Technical Network Vulnerability Assessment: EPA’s Region 4

    EPA Pesticide Factsheets

    Report #10-P-0213, September 7, 2010. Vulnerability testing of EPA’s Region 4 network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  5. Using Social Network Analysis as a Method to Assess and Strengthen Participation in Health Promotion Programs in Vulnerable Areas.

    PubMed

    Hindhede, Anette Lykke; Aagaard-Hansen, Jens

    2017-03-01

    This article provides an example of the application of social network analysis method to assess community participation thereby strengthening planning and implementation of health promotion programming. Community health promotion often takes the form of services that reach out to or are located within communities. The concept of community reflects the idea that people's behavior and well-being are influenced by interaction with others, and here, health promotion requires participation and local leadership to facilitate transmission and uptake of interventions for the overall community to achieve social change. However, considerable uncertainty exists over exact levels of participation in these interventions. The article draws on a mixed methods research within a community development project in a vulnerable neighborhood of a town in Denmark. It presents a detailed analysis of the way in which social network analysis can be used as a tool to display participation and nonparticipation in community development and health promotion activities, to help identify capacities and assets, mobilize resources, and finally to evaluate the achievements. The article concludes that identification of interpersonal ties among people who know one another well as well as more tenuous relationships in networks can be used by community development workers to foster greater cohesion and cooperation within an area.

  6. Report: Results of Technical Network Vulnerability Assessment: EPA’s Research Triangle Park Finance Center

    EPA Pesticide Factsheets

    Report #09-P-0227, August 31, 2009. Vulnerability testing conducted in April 2009 of EPA’s Research Triangle Park Finance Center network identified Internet Protocol addresses with several highrisk vulnerabilities.

  7. Report: Results of Technical Network Vulnerability Assessment: EPA’s Radiation and Indoor Environments National Laboratory

    EPA Pesticide Factsheets

    Report #09-P-0053, December 9, 2008. Vulnerability testing of EPA’s Radiation and Indoor Environments National Laboratory (R&IEN) network identified Internet Protocol addresses with medium-risk vulnerabilities.

  8. Report: Results of Technical Network Vulnerability Assessment: EPA’s Ronald Reagan Building

    EPA Pesticide Factsheets

    Report #10-P-0212, September 7, 2010. Vulnerability testing of EPA’s Ronald Reagan Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  9. Modeling the Propagation of Mobile Phone Virus under Complex Network

    PubMed Central

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209

  10. Migration, social structure and old-age support networks: a comparison of three Indonesian communities

    PubMed Central

    KREAGER, PHILIP

    2007-01-01

    Contemporary trends in population ageing and urbanisation in the developing world imply that the extensive out-migration of young people from rural areas coincides with, and is likely to exacerbate, a rise in the older share of the rural population. This paper examines the impact of migration on vulnerability at older ages by drawing on the results of anthropological and demographic field studies in three Indonesian communities. The methodology for identifying vulnerable older people has a progressively sharper focus, beginning first with important differences between the communities, then examining variations by socio-economic strata, and finally the variability of older people's family networks. Comparative analysis indicates considerable heterogeneity in past and present migration patterns, both within and between villages. The migrants' contributions are a normal and important component of older people's support, often in combination with those of local family members. Higher status families are commonly able to reinforce their position by making better use of migration opportunities than the less advantaged. Although family networks in the poorer strata may effect some redistribution of the children's incomes, their social networks are smaller and insufficient to overcome their marked disadvantages. Vulnerability thus arises where several factors, including migration histories, result in unusually small networks, and when the migrations are within rural areas. PMID:23750063

  11. Leveraging Social Links for Trust and Privacy in Networks

    NASA Astrophysics Data System (ADS)

    Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten

    Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

  12. Security Investment in Contagious Networks.

    PubMed

    Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz

    2018-01-16

    Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.

  13. URBAN-NET: A Network-based Infrastructure Monitoring and Analysis System for Emergency Management and Public Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Sangkeun; Chen, Liangzhe; Duan, Sisi

    Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here amore » novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.« less

  14. Statistics of software vulnerability detection in certification testing

    NASA Astrophysics Data System (ADS)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.

  15. Report: Results of Technical Network Vulnerability Assessment: EPA’s National Vehicle and Fuel Emissions Laboratory

    EPA Pesticide Factsheets

    Report #12-P-0900, September 27, 2012. Vulnerability testing of networked resources located in the NVFEL identified Internet Protocol addresses with potentially 9 critical-risk, 70 high-risk, and 297 medium-risk vulnerabilities.

  16. Report: Results of Technical Network Vulnerability Assessment: EPA’s Andrew W. Breidenbach Environmental Research Center

    EPA Pesticide Factsheets

    Report #10-P-0210, September 7, 2010. Vulnerability testing of EPA’s Andrew W. Breidenbach Environmental Research Center network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  17. Warfighter Information Network - Tactical (WIN-T) Increment 2: Second Follow-on Operational Test and Evaluation

    DTIC Science & Technology

    2015-05-01

    HNW line-of-sight network is mounted on a 10-meter telescoping mast located just aft of the TCN’s cab. The flat plate Range Throughput Extension Kit... TAC – Tactical Command Post ATH – At-the-Halt PoP – Point of Presence SNE – Soldier Network Extension NOSC – Network Operations & Security...Survivability/Lethality Analysis Directorate (ARL/SLAD) conducted a Cooperative Vulnerability and Penetration Assessment on WIN-T Increment 2. The Army

  18. Analysis, calculation and utilization of the k-balance attribute in interdependent networks

    NASA Astrophysics Data System (ADS)

    Liu, Zheng; Li, Qing; Wang, Dan; Xu, Mingwei

    2018-05-01

    Interdependent networks, where two networks depend on each other, are becoming more and more significant in modern systems. From previous work, it can be concluded that interdependent networks are more vulnerable than a single network. The robustness in interdependent networks deserves special attention. In this paper, we propose a metric of robustness from a new perspective-the balance. First, we define the balance-coefficient of the interdependent system. Based on precise analysis and derivation, we prove some significant theories and provide an efficient algorithm to compute the balance-coefficient. Finally, we propose an optimal solution to reduce the balance-coefficient to enhance the robustness of the given system. Comprehensive experiments confirm the efficiency of our algorithms.

  19. World-wide satellite night-light data as a proxy of society-hydrology interaction and vulnerability to flood risk

    NASA Astrophysics Data System (ADS)

    Ceola, S.; Laio, F.; Montanari, A.

    2013-12-01

    The study and the analysis of the interactions and feedbacks between hydrology and society constitute the main issue of socio-hydrology. Recent flood events, which occurred across the globe, highlighted once again that mitigation strategies are needed to reduce flood risk. In particular, quick procedures for the identification of vulnerable human settlements and flood prone areas are a necessary tool to identify priorities for flood risk management. To this aim, a 19-year long period of world-wide night light data, as a proxy of human population, and the global river network have been examined. The spatio-temporal evolution of artificial luminosity depending on the distance from the river network has been assessed in order to quantitatively identify the likelihood for a populated pixel to be reached by water. The analysis focuses both on a global and on a local scale. Hotspots, such as highly illuminated areas and developing regions, have been also examined. The analysis shows an increment of yearly-averaged artificial luminosity from 1992 to 2010 (i.e. the time period of satellite data availability), whereas light intensity tends to decrease with increasing distance from the river network. The results thus reveal an increased vulnerability of human settlements to flooding events. A nearly 70-year long period of peace and the economic development after the Second World War could reasonably explain the observed enhancement of human population proximity to water bodies.

  20. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    NASA Astrophysics Data System (ADS)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  1. A support network typology for application in older populations with a preponderance of multigenerational households.

    PubMed

    Burholt, Vanessa; Dobbs, Christine

    2014-08-01

    This paper considers the support networks of older people in populations with a preponderance of multigenerational households and examines the most vulnerable network types in terms of loneliness and isolation. Current common typologies of support networks may not be sensitive to differences within and between different cultures. This paper uses cross-sectional data drawn from 590 elders (Gujaratis, Punjabis and Sylhetis) living in the United Kingdom and South Asia. Six variables were used in K-means cluster analysis to establish a new network typology. Two logistic regression models using loneliness and isolation as dependent variables assessed the contribution of the new network type to wellbeing. Four support networks were identified: 'Multigenerational Households: Older Integrated Networks', 'Multigenerational Households: Younger Family Networks', 'Family and Friends Integrated Networks' and 'Non-kin Restricted Networks'. Older South Asians with 'Non-kin Restricted Networks' were more likely to be lonely and isolated compared to others. Using network typologies developed with individualistically oriented cultures, distributions are skewed towards more robust network types and could underestimate the support needs of older people from familistic cultures, who may be isolated and lonely and with limited informal sources of help. The new typology identifies different network types within multigenerational households, identifies a greater proportion of older people with vulnerable networks and could positively contribute to service planning.

  2. Measurement of traffic network vulnerability for Mississippi coastal region : final research report.

    DOT National Transportation Integrated Search

    2017-08-15

    Natural disasters such as a hurricane can cause great damages to the transportation networks and significantly affect the evacuation trip operations. An accurate understanding and measurement of the network vulnerability can enhance the evacuees p...

  3. A network-based framework for assessing infrastructure resilience: a case study of the London metro system.

    PubMed

    Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas

    2016-05-01

    Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).

  4. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  5. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  6. Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo

    This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.

  7. Passive and Active Analysis in DSR-Based Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)

    Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.

  8. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  9. Moving Target Techniques: Leveraging Uncertainty for CyberDefense

    DTIC Science & Technology

    2015-12-15

    cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic  Network   Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed

  10. Accessibility assessment of Houston's roadway network during Harvey through integration of observed flood impacts and hydrologic modeling

    NASA Astrophysics Data System (ADS)

    Gidaris, I.; Gori, A.; Panakkal, P.; Padgett, J.; Bedient, P. B.

    2017-12-01

    The record-breaking rainfall produced over the Houston region by Hurricane Harvey resulted in catastrophic and unprecedented impacts on the region's infrastructure. Notably, Houston's transportation network was crippled, with almost every major highway flooded during the five-day event. Entire neighborhoods and subdivisions were inundated, rendering them completely inaccessible to rescue crews and emergency services. Harvey has tragically highlighted the vulnerability of major thoroughfares, as well as neighborhood roads, to severe inundation during extreme precipitation events. Furthermore, it has emphasized the need for detailed accessibility characterization of road networks under extreme event scenarios in order to determine which areas of the city are most vulnerable. This analysis assesses and tracks the accessibility of Houston's major highways during Harvey's evolution by utilizing road flood/closure data from the Texas DOT. In the absence of flooded/closure data for local roads, a hybrid approach is adopted that utilizes a physics-based hydrologic model to produce high-resolution inundation estimates for selected urban watersheds in the Houston area. In particular, hydrologic output in the form of inundation depths is used to estimate the operability of local roads. Ultimately, integration of hydrologic-based estimation of road conditions with observed data from DOT supports a network accessibility analysis of selected urban neighborhoods. This accessibility analysis can identify operable routes for emergency response (rescue crews, medical services, etc.) during the storm event.

  11. ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.

    PubMed

    Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja

    2013-08-15

    Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.

  12. ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability

    PubMed Central

    Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja

    2013-01-01

    Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application. PMID:23955435

  13. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  14. Quantitative Assessment of Transportation Network Vulnerability with Dynamic Traffic Simulation Methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat

    Transportation networks are critical to the social and economic function of nations. Given the continuing increase in the populations of cities throughout the world, the criticality of transportation infrastructure is expected to increase. Thus, it is ever more important to mitigate congestion as well as to assess the impact disruptions would have on individuals who depend on transportation for their work and livelihood. Moreover, several government organizations are responsible for ensuring transportation networks are available despite the constant threat of natural disasters and terrorist activities. Most of the previous transportation network vulnerability research has been performed in the context ofmore » static traffic models, many of which are formulated as traditional optimization problems. However, transportation networks are dynamic because their usage varies over time. Thus, more appropriate methods to characterize the vulnerability of transportation networks should consider their dynamic properties. This paper presents a quantitative approach to assess the vulnerability of a transportation network to disruptions with methods from traffic simulation. Our approach can prioritize the critical links over time and is generalizable to the case where both link and node disruptions are of concern. We illustrate the approach through a series of examples. Our results demonstrate that the approach provides quantitative insight into the time varying criticality of links. Such an approach could be used as the objective function of less traditional optimization methods that use simulation and other techniques to evaluate the relative utility of a particular network defense to reduce vulnerability and increase resilience.« less

  15. Information Assurance as a System of Systems in the Submarine Force

    DTIC Science & Technology

    2013-09-01

    cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network security...understand the cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network...Table 2. Assessment Scale– Vulnerability Severity (After NIST 800–30 Rev1 2012, F-2

  16. VMSoar: a cognitive agent for network security

    NASA Astrophysics Data System (ADS)

    Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana

    2005-03-01

    VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.

  17. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    NASA Astrophysics Data System (ADS)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling between CIS.

  18. The vulnerability of the global container shipping network to targeted link disruption

    NASA Astrophysics Data System (ADS)

    Viljoen, Nadia M.; Joubert, Johan W.

    2016-11-01

    Using complex network theory to describe the relational geography of maritime networks has provided great insights regarding their hierarchy and evolution over the past two decades. Unlike applications in other transport fields, notably air transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure such as ports can render a network vulnerable as a result of labour strikes, trade embargoes or natural disasters, it is the shipping lines connecting the ports that are more probably disrupted, either from within the industry, or outside. In this paper, we apply and evaluate two link-based disruption strategies on the global container shipping network, one based on link betweenness, and the other on link salience, to emulate the impact of large-scale service reconfiguration affecting priority links. The results show that the network is by and large robust to such reconfiguration. Meanwhile the flexibility of the network is reduced by both strategies, but to a greater degree by betweenness, resulting in a reduction of transshipment and dynamic rerouting potential amongst the busiest port regions. The results further show that the salience strategy is highly effective in reducing the commonality of shortest path sets, thereby diminishing opportunities for freight consolidation and scale economies.

  19. An examination of the perceptions of social network characteristics associated with grandiose and vulnerable narcissism.

    PubMed

    Lamkin, Joanna; Clifton, Allan; Campbell, W Keith; Miller, Joshua D

    2014-04-01

    Two dimensions of narcissism exist, grandiose and vulnerable, which are thought to be associated with distinctly different patterns of interpersonal behavior. Social network analysis is a way of quantifying and analyzing interpersonal interactions that may prove useful for characterizing the networks associated with these narcissism dimensions. In the current study, participants (N = 148) completed scales assessing both narcissism dimensions and a measure of the five-factor model of personality. Egocentric network information about participants' 30 closest friends and family members (i.e., "alters") was also obtained. Both narcissism dimensions were characterized by negative perceptions of the individuals who comprise one's social networks, and many of these relations were mediated by individuals' higher levels of antagonism. Grandiose narcissism also interacted with alter centrality (i.e., importance to the network) such that individuals low on grandiose narcissism were less likely to perceive central alters in a negative light and were more attuned to central alters than were individuals high on grandiose narcissism. Overall, both narcissism dimensions were associated with perceiving one's overall social environment negatively because of the high levels of antagonism that characterize both narcissism dimensions. Individuals high on grandiose narcissism, however, appear to be more insensitive to the relative importance of individuals in their social networks. PsycINFO Database Record (c) 2014 APA, all rights reserved

  20. Vulnerability of dynamic genetic conservation units of forest trees in Europe to climate change.

    PubMed

    Schueler, Silvio; Falk, Wolfgang; Koskela, Jarkko; Lefèvre, François; Bozzano, Michele; Hubert, Jason; Kraigher, Hojka; Longauer, Roman; Olrik, Ditte C

    2014-05-01

    A transnational network of genetic conservation units for forest trees was recently documented in Europe aiming at the conservation of evolutionary processes and the adaptive potential of natural or man-made tree populations. In this study, we quantified the vulnerability of individual conservation units and the whole network to climate change using climate favourability models and the estimated velocity of climate change. Compared to the overall climate niche of the analysed target species populations at the warm and dry end of the species niche are underrepresented in the network. However, by 2100, target species in 33-65 % of conservation units, mostly located in southern Europe, will be at the limit or outside the species' current climatic niche as demonstrated by favourabilities below required model sensitivities of 95%. The highest average decrease in favourabilities throughout the network can be expected for coniferous trees although they are mainly occurring within units in mountainous landscapes for which we estimated lower velocities of change. Generally, the species-specific estimates of favourabilities showed only low correlations to the velocity of climate change in individual units, indicating that both vulnerability measures should be considered for climate risk analysis. The variation in favourabilities among target species within the same conservation units is expected to increase with climate change and will likely require a prioritization among co-occurring species. The present results suggest that there is a strong need to intensify monitoring efforts and to develop additional conservation measures for populations in the most vulnerable units. Also, our results call for continued transnational actions for genetic conservation of European forest trees, including the establishment of dynamic conservation populations outside the current species distribution ranges within European assisted migration schemes. © 2013 John Wiley & Sons Ltd.

  1. NINJA: a noninvasive framework for internal computer security hardening

    NASA Astrophysics Data System (ADS)

    Allen, Thomas G.; Thomson, Steve

    2004-07-01

    Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.

  2. Sea level rise impacts on wastewater treatment systems along the U.S. coasts

    NASA Astrophysics Data System (ADS)

    Hummel, M.; Berry, M.; Stacey, M. T.

    2017-12-01

    As sea levels rise, coastal communities will experience more frequent and persistent nuisance flooding, and some low-lying areas may be permanently inundated. Critical components of lifeline infrastructure networks in these areas are also at risk of flooding, which could cause significant service disruptions that extend beyond the flooded zone. Thus, identifying critical infrastructure components that are vulnerable to sea level rise is an important first step in developing targeted investment in protective actions and enhancing the overall resilience of coastal communities. Wastewater treatment plants are typically located at low elevations near the coastline to minimize the cost of collecting consumed water and discharging treated effluent, which makes them particularly susceptible to coastal flooding. For this analysis, we used geographic information systems to assess the vulnerability of wastewater infrastructure to various sea level rise projections at the national level. We then estimated the number of people who would lose wastewater services, which could be more than three times as high as previous predictions of the number of people at risk of direct flooding due to sea level rise. We also considered several case studies of wastewater infrastructure in mid-sized cities to determine how topography and system configuration (centralized versus distributed) impact vulnerability. Overall, this analysis highlights the widespread vulnerability of wastewater infrastructure in the U.S. and demonstrates that local disruptions to infrastructure networks may have far-ranging impacts on areas that do not experience direct flooding.

  3. Development of a decision support tool for assessing vulnerability of transportation networks.

    DOT National Transportation Integrated Search

    2010-08-01

    This research develops a decision support tool for assessing vulnerability of transportation networks. This report consists of 1) describing the trends of freight movements in Utah, 2) identifying the current and potential freight chokepoints/bottlen...

  4. Identification of Common Neural Circuit Disruptions in Cognitive Control Across Psychiatric Disorders.

    PubMed

    McTeague, Lisa M; Huemer, Julia; Carreon, David M; Jiang, Ying; Eickhoff, Simon B; Etkin, Amit

    2017-07-01

    Cognitive deficits are a common feature of psychiatric disorders. The authors investigated the nature of disruptions in neural circuitry underlying cognitive control capacities across psychiatric disorders through a transdiagnostic neuroimaging meta-analysis. A PubMed search was conducted for whole-brain functional neuroimaging articles published through June 2015 that compared activation in patients with axis I disorders and matched healthy control participants during cognitive control tasks. Tasks that probed performance or conflict monitoring, response inhibition or selection, set shifting, verbal fluency, and recognition or working memory were included. Activation likelihood estimation meta-analyses were conducted on peak voxel coordinates. The 283 experiments submitted to meta-analysis included 5,728 control participants and 5,493 patients with various disorders (schizophrenia, bipolar or unipolar depression, anxiety disorders, and substance use disorders). Transdiagnostically abnormal activation was evident in the left prefrontal cortex as well as the anterior insula, the right ventrolateral prefrontal cortex, the right intraparietal sulcus, and the midcingulate/presupplementary motor area. Disruption was also observed in a more anterior cluster in the dorsal cingulate cortex, which overlapped with a network of structural perturbation that the authors previously reported in a transdiagnostic meta-analysis of gray matter volume. These findings demonstrate a common pattern of disruption across major psychiatric disorders that parallels the "multiple-demand network" observed in intact cognition. This network interfaces with the anterior-cingulo-insular or "salience network" demonstrated to be transdiagnostically vulnerable to gray matter reduction. Thus, networks intrinsic to adaptive, flexible cognition are vulnerable to broad-spectrum psychopathology. Dysfunction in these networks may reflect an intermediate transdiagnostic phenotype, which could be leveraged to advance therapeutics.

  5. Regional vulnerability of longitudinal cortical association connectivity: Associated with structural network topology alterations in preterm children with cerebral palsy.

    PubMed

    Ceschin, Rafael; Lee, Vince K; Schmithorst, Vince; Panigrahy, Ashok

    2015-01-01

    Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL), are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI) studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4) and 75 healthy controls (mean age 5.7 ± 3.4). Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS) and voxel-based morphometry (VBM) demonstrating diffusely reduced fractional anisotropy (FA) reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1) reduced regional posterior-anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation) correlated with reduced posterior-anterior gradient of intra-regional (nodal efficiency) metrics with relative sparing of frontal and temporal regions; and (2) reduced regional FA within frontal-thalamic-striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract) correlated with alteration in eigenvector centrality, clustering coefficient (inter-regional) and participation co-efficient (inter-modular) alterations of frontal-striatal and fronto-limbic nodes suggesting re-organization of these pathways. Both along tract and structural topology network measurements correlated strongly with motor and visual clinical outcome scores. This study shows the value of combining along-tract analysis and structural network topology in depicting not only selective parietal occipital regional vulnerability but also reorganization of frontal-striatal and frontal-limbic pathways in preterm children with cerebral palsy. These finding also support the concept that widespread, but selective posterior-anterior neural network connectivity alterations in preterm children with cerebral palsy likely contribute to the pathogenesis of neurosensory and cognitive impairment in this group.

  6. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  7. Vulnerability of a killer whale social network to disease outbreaks

    NASA Astrophysics Data System (ADS)

    Guimarães, Paulo R., Jr.; de Menezes, Márcio Argollo; Baird, Robin W.; Lusseau, David; Guimarães, Paulo; Dos Reis, Sérgio F.

    2007-10-01

    Emerging infectious diseases are among the main threats to conservation of biological diversity. A crucial task facing epidemiologists is to predict the vulnerability of populations of endangered animals to disease outbreaks. In this context, the network structure of social interactions within animal populations may affect disease spreading. However, endangered animal populations are often small and to investigate the dynamics of small networks is a difficult task. Using network theory, we show that the social structure of an endangered population of mammal-eating killer whales is vulnerable to disease outbreaks. This feature was found to be a consequence of the combined effects of the topology and strength of social links among individuals. Our results uncover a serious challenge for conservation of the species and its ecosystem. In addition, this study shows that the network approach can be useful to study dynamical processes in very small networks.

  8. Assessing the Climate Resilience of Transport Infrastructure Investments in Tanzania

    NASA Astrophysics Data System (ADS)

    Hall, J. W.; Pant, R.; Koks, E.; Thacker, S.; Russell, T.

    2017-12-01

    Whilst there is an urgent need for infrastructure investment in developing countries, there is a risk that poorly planned and built infrastructure will introduce new vulnerabilities. As climate change increases the magnitudes and frequency of natural hazard events, incidence of disruptive infrastructure failures are likely to become more frequent. Therefore, it is important that infrastructure planning and investment is underpinned by climate risk assessment that can inform adaptation planning. Tanzania's rapid economic growth is placing considerable strain on the country's transportation infrastructure (roads, railways, shipping and aviation); especially at the port of Dar es Salaam and its linking transport corridors. A growing number of natural hazard events, in particular flooding, are impacting the reliability of this already over-used network. Here we report on new methodology to analyse vulnerabilities and risks due to failures of key locations in the intermodal transport network of Tanzania, including strategic connectivity to neighboring countries. To perform the national-scale risk analysis we will utilize a system-of-systems methodology. The main components of this general risk assessment, when applied to transportation systems, include: (1) Assembling data on: spatially coherent extreme hazards and intermodal transportation networks; (2) Intersecting hazards with transport network models to initiate failure conditions that trigger failure propagation across interdependent networks; (3) Quantifying failure outcomes in terms of social impacts (customers/passengers disrupted) and/or macroeconomic consequences (across multiple sectors); and (4) Simulating, testing and collecting multiple failure scenarios to perform an exhaustive risk assessment in terms of probabilities and consequences. The methodology is being used to pinpoint vulnerability and reduce climate risks to transport infrastructure investments.

  9. Multiobjective analysis of a public wellfield using artificial neural networks

    USGS Publications Warehouse

    Coppola, E.A.; Szidarovszky, F.; Davis, D.; Spayd, S.; Poulton, M.M.; Roman, E.

    2007-01-01

    As competition for increasingly scarce ground water resources grows, many decision makers may come to rely upon rigorous multiobjective techniques to help identify appropriate and defensible policies, particularly when disparate stakeholder groups are involved. In this study, decision analysis was conducted on a public water supply wellfield to balance water supply needs with well vulnerability to contamination from a nearby ground water contaminant plume. With few alternative water sources, decision makers must balance the conflicting objectives of maximizing water supply volume from noncontaminated wells while minimizing their vulnerability to contamination from the plume. Artificial neural networks (ANNs) were developed with simulation data from a numerical ground water flow model developed for the study area. The ANN-derived state transition equations were embedded into a multiobjective optimization model, from which the Pareto frontier or trade-off curve between water supply and wellfield vulnerability was identified. Relative preference values and power factors were assigned to the three stakeholders, namely the company whose waste contaminated the aquifer, the community supplied by the wells, and the water utility company that owns and operates the wells. A compromise pumping policy that effectively balances the two conflicting objectives in accordance with the preferences of the three stakeholder groups was then identified using various distance-based methods. ?? 2006 National Ground Water Association.

  10. Vulnerability of Thai rice production to simultaneous climate and socioeconomic changes: a double exposure analysis

    NASA Astrophysics Data System (ADS)

    Sangpenchan, R.

    2011-12-01

    This research explores the vulnerability of Thai rice production to simultaneous exposure by climate and socioeconomic change -- so-called "double exposure." Both processes influence Thailand's rice production system, but the vulnerabilities associated with their interactions are unknown. To understand this double exposure, I adopts a mixed-method, qualitative-quantitative analytical approach consisting of three phases of analysis involving a Vulnerability Scoping Diagram, a Principal Component Analysis, and the EPIC crop model using proxy datasets collected from secondary data sources at provincial scales.The first and second phases identify key variables representing each of the three dimensions of vulnerability -- exposure, sensitivity, and adaptive capacity indicating that the greatest vulnerability in the rice production system occurs in households and areas with high exposure to climate change, high sensitivity to climate and socioeconomic stress, and low adaptive capacity. In the third phase, the EPIC crop model simulates rice yields associated with future climate change projected by CSIRO and MIROC climate models. Climate change-only scenarios project the decrease in yields by 10% from the current productivity during 2016-2025 and 30% during 2045-2054. Scenarios applying both climate change and improved technology and management practices show that a 50% increase in rice production is possible, but requires strong collaboration between sectors to advance agricultural research and technology and requires strong adaptive capacity in the rice production system characterized by well-developed social capital, social networks, financial capacity, and infrastructure and household mobility at the local scale. The vulnerability assessment and climate and crop adaptation simulations used here provide useful information to decision makers developing vulnerability reduction plans in the face of concurrent climate and socioeconomic change.

  11. Virtual water trade and country vulnerability: A network perspective

    NASA Astrophysics Data System (ADS)

    Sartori, Martina; Schiavo, Stefano

    2015-04-01

    This work investigates the relationship between countries' participation in virtual water trade and their vulnerability to external shocks from a network perspective. In particular, we investigate whether (i) possible sources of local national crises may interact with the system, propagating through the network and affecting the other countries involved; (ii) the topological characteristics of the international agricultural trade network, translated into virtual water-equivalent flows, may favor countries' vulnerability to external crises. Our work contributes to the debate on the potential merits and risks associated with openness to trade in agricultural and food products. On the one hand, trade helps to ensure that even countries with limited water (and other relevant) resources have access to sufficient food and contribute to the global saving of water. On the other hand, there are fears that openness may increase the vulnerability to external shocks and thus make countries worse off. Here we abstract from political considerations about food sovereignty and independence from imports and focus instead on investigating whether the increased participation in global trade that the world has witnessed in the last 30 years has made the system more susceptible to large shocks. Our analysis reveals that: (i) the probability of larger supply shocks has not increased over time; (ii) the topological characteristics of the VW network are not such as to favor the systemic risk associated with shock propagation; and (iii) higher-order interconnections may reveal further important information about the structure of a network. Regarding the first result, fluctuations in output volumes, among the sources of shock analyzed here, are more likely to generate some instability. The first implication is that, on one side, past national or regional economic crises were not necessarily brought about or strengthened by global trade. The second, more remarkable, implication is that, on the other side, supporting a national policy of self-sufficiency in food production while progressively reducing the participation in international agricultural trade does not necessarily protect a country from economic instability. Moreover, it is well established in the literature that, over time, international food trade has favored more efficient use of water resources, at the global level. This fact, together with our conclusions, highlights the important role of international trade in driving the efficient allocation of water resources. To sum up, our evidence reveals that the increased globalization witnessed in the last 30 years is not associated with an increased frequency of adverse shocks (in either precipitation or food production). Furthermore, building on recent advances in network analysis that connect the stability of a complex system to the interaction between the distribution of shocks and the network topology, we find that the world is more interconnected, but not necessarily less stable.

  12. Cascading Failures and Recovery in Networks of Networks

    NASA Astrophysics Data System (ADS)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  13. Assessing node risk and vulnerability in epidemics on networks

    NASA Astrophysics Data System (ADS)

    Rogers, T.

    2015-01-01

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  14. Assessing the risk posed by natural hazards to infrastructures

    NASA Astrophysics Data System (ADS)

    Eidsvig, Unni; Kristensen, Krister; Vidar Vangelsten, Bjørn

    2015-04-01

    The modern society is increasingly dependent on infrastructures to maintain its function, and disruption in one of the infrastructure systems may have severe consequences. The Norwegian municipalities have, according to legislation, a duty to carry out a risk and vulnerability analysis and plan and prepare for emergencies in a short- and long term perspective. Vulnerability analysis of the infrastructures and their interdependencies is an important part of this analysis. This paper proposes a model for assessing the risk posed by natural hazards to infrastructures. The model prescribes a three level analysis with increasing level of detail, moving from qualitative to quantitative analysis. This paper focuses on the second level, which consists of a semi-quantitative analysis. The purpose of this analysis is to perform a screening of the scenarios of natural hazards threatening the infrastructures identified in the level 1 analysis and investigate the need for further analyses, i.e. level 3 quantitative analyses. The proposed level 2 analysis considers the frequency of the natural hazard, different aspects of vulnerability including the physical vulnerability of the infrastructure itself and the societal dependency on the infrastructure. An indicator-based approach is applied, ranking the indicators on a relative scale. The proposed indicators characterize the robustness of the infrastructure, the importance of the infrastructure as well as interdependencies between society and infrastructure affecting the potential for cascading effects. Each indicator is ranked on a 1-5 scale based on pre-defined ranking criteria. The aggregated risk estimate is a combination of the semi-quantitative vulnerability indicators, as well as quantitative estimates of the frequency of the natural hazard and the number of users of the infrastructure. Case studies for two Norwegian municipalities are presented, where risk to primary road, water supply and power network threatened by storm and landslide is assessed. The application examples show that the proposed model provides a useful tool for screening of undesirable events, with the ultimate goal to reduce the societal vulnerability.

  15. A Methodology for Assessing the Seismic Vulnerability of Highway Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco

    2008-07-08

    Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the placesmore » of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system.« less

  16. Vulnerability of network of networks

    NASA Astrophysics Data System (ADS)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  17. The interplay between cognitive risk and resilience factors in remitted depression: A network analysis.

    PubMed

    Hoorelbeke, Kristof; Marchetti, Igor; De Schryver, Maarten; Koster, Ernst H W

    2016-05-01

    Individuals in remission from depression are at increased risk for developing future depressive episodes. Several cognitive risk- and resilience factors have been suggested to account for this vulnerability. In the current study we explored how risk- and protective factors such as cognitive control, adaptive and maladaptive emotion regulation, residual symptomatology, and resilience relate to one another in a remitted depressed (RMD) sample. We examined the relationships between these constructs in a cross-sectional dataset of 69 RMD patients using network analyses in order to obtain a comprehensive, data-driven view on the interplay between these constructs. We subsequently present an association network, a concentration network, and a relative importance network. In all three networks resilience formed the central hub, connecting perceived cognitive control (i.e., working memory complaints), emotion regulation, and residual symptomatology. The contribution of the behavioral measure for cognitive control in the network was negligible. Moreover, the directed relative importance network indicates bidirectional influences between these constructs, with all indicators of centrality suggesting a key role of resilience in remission from depression. The presented findings are cross-sectional and networks are limited to a fixed set of key constructs in the literature pertaining cognitive vulnerability for depression. These findings indicate the importance of resilience to successfully cope with stressors following remission from depression. Further in-depth studies will be essential to identify the specific underlying resilience mechanisms that may be key to successful remission from depression. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    NASA Astrophysics Data System (ADS)

    Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko

    2016-10-01

    In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  19. Feature-based alert correlation in security systems using self organizing maps

    NASA Astrophysics Data System (ADS)

    Kumar, Munesh; Siddique, Shoaib; Noor, Humera

    2009-04-01

    The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.

  20. Revealing the cerebral regions and networks mediating vulnerability to depression: oxidative metabolism mapping of rat brain.

    PubMed

    Harro, Jaanus; Kanarik, Margus; Kaart, Tanel; Matrov, Denis; Kõiv, Kadri; Mällo, Tanel; Del Río, Joaquin; Tordera, Rosa M; Ramirez, Maria J

    2014-07-01

    The large variety of available animal models has revealed much on the neurobiology of depression, but each model appears as specific to a significant extent, and distinction between stress response, pathogenesis of depression and underlying vulnerability is difficult to make. Evidence from epidemiological studies suggests that depression occurs in biologically predisposed subjects under impact of adverse life events. We applied the diathesis-stress concept to reveal brain regions and functional networks that mediate vulnerability to depression and response to chronic stress by collapsing data on cerebral long term neuronal activity as measured by cytochrome c oxidase histochemistry in distinct animal models. Rats were rendered vulnerable to depression either by partial serotonergic lesion or by maternal deprivation, or selected for a vulnerable phenotype (low positive affect, low novelty-related activity or high hedonic response). Environmental adversity was brought about by applying chronic variable stress or chronic social defeat. Several brain regions, most significantly median raphe, habenula, retrosplenial cortex and reticular thalamus, were universally implicated in long-term metabolic stress response, vulnerability to depression, or both. Vulnerability was associated with higher oxidative metabolism levels as compared to resilience to chronic stress. Chronic stress, in contrast, had three distinct patterns of effect on oxidative metabolism in vulnerable vs. resilient animals. In general, associations between regional activities in several brain circuits were strongest in vulnerable animals, and chronic stress disrupted this interrelatedness. These findings highlight networks that underlie resilience to stress, and the distinct response to stress that occurs in vulnerable subjects. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. A Transmission Availability Forecast Service for Internet Protocol Networks

    DTIC Science & Technology

    1998-12-01

    long term changes in the network situation. The probe measurement takes a finite period and so can aggregate and characterise short term variations in...network situation. Nevertheless, the process remains vulnerable to medium term variations, ie changes that occur after the probe and before the download...vulnerable to the medium term changes that might occur between the completion of the examination and the commencement of the download. 3.2 TAF

  2. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics

    DTIC Science & Technology

    2012-05-22

    cyber at- tack. Recently, high -prole successful attacks have been detected against the International Mon- etary Fund, Citibank, Lockheed Martin, Google...RSA Security, Sony, and Oak Ridge National Laboratory[13]. These and other attacks have heightened securing networks as a high priority for many...of high -severity vulnerabilities found by network vulnerability scanners (e.g., [40]) and the numbers or percentages of hosts that are are not

  3. Responses to a self-presented suicide attempt in social media: a social network analysis.

    PubMed

    Fu, King-Wa; Cheng, Qijin; Wong, Paul W C; Yip, Paul S F

    2013-01-01

    The self-presentation of suicidal acts in social media has become a public health concern. This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users--and at a faster pace-- than a set of randomly generated networks. We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene.

  4. Aircraft vulnerability analysis by modeling and simulation

    NASA Astrophysics Data System (ADS)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum guidance acceleration and seeker sensitivity. For the purpose of this investigation the aircraft is equipped with conventional pyrotechnic decoy flares and the missile has no counter-countermeasure means (security restrictions on open publication). This complete simulation is used to calculate the missile miss distance, when the missile is launched from different locations around the aircraft. The miss distance data is then graphically presented showing miss distance (aircraft vulnerability) as a function of launch direction and range. The aircraft vulnerability graph accounts for aircraft and missile characteristics, but does not account for missile deployment doctrine. A Bayesian network is constructed to fuse the doctrinal rules with the aircraft vulnerability data. The Bayesian network now provides the capability to evaluate the combined risk of missile launch and aircraft vulnerability. It is shown in this paper that it is indeed possible to predict the aircraft vulnerability to missile attack in a comprehensive modelling and a holistic process. By using the appropriate real-world models, this approach is used to evaluate the effectiveness of specific countermeasure techniques against specific missile threats. The use of a Bayesian network provides the means to fuse simulated performance data with more abstract doctrinal rules to provide a realistic assessment of the aircraft vulnerability.

  5. MERINOVA: Meteorological risks as drivers of environmental innovation in agro-ecosystem management

    NASA Astrophysics Data System (ADS)

    Gobin, Anne; Oger, Robert; Marlier, Catherine; Van De Vijver, Hans; Vandermeulen, Valerie; Van Huylenbroeck, Guido; Zamani, Sepideh; Curnel, Yannick; Mettepenningen, Evi

    2013-04-01

    The BELSPO funded project 'MERINOVA' deals with risks associated with extreme weather phenomena and with risks of biological origin such as pests and diseases. The major objectives of the proposed project are to characterise extreme meteorological events, assess the impact on Belgian agro-ecosystems, characterise their vulnerability and resilience to these events, and explore innovative adaptation options to agricultural risk management. The project comprises of five major parts that reflect the chain of risks: (i) Hazard: Assessing the likely frequency and magnitude of extreme meteorological events by means of probability density functions; (ii) Impact: Analysing the potential bio-physical and socio-economic impact of extreme weather events on agro-ecosystems in Belgium using process-based modelling techniques commensurate with the regional scale; (iii) Vulnerability: Identifying the most vulnerable agro-ecosystems using fuzzy multi-criteria and spatial analysis; (iv) Risk Management: Uncovering innovative risk management and adaptation options using actor-network theory and fuzzy cognitive mapping techniques; and, (v) Communication: Communicating to research, policy and practitioner communities using web-based techniques. The different tasks of the MERINOVA project require expertise in several scientific disciplines: meteorology, statistics, spatial database management, agronomy, bio-physical impact modelling, socio-economic modelling, actor-network theory, fuzzy cognitive mapping techniques. These expertises are shared by the four scientific partners who each lead one work package. The MERINOVA project will concentrate on promoting a robust and flexible framework by demonstrating its performance across Belgian agro-ecosystems, and by ensuring its relevance to policy makers and practitioners. Impacts developed from physically based models will not only provide information on the state of the damage at any given time, but also assist in understanding the links between different factors causing damage and determining bio-physical vulnerability. Socio-economic impacts will enlarge the basis for vulnerability mapping, risk management and adaptation options. A strong expert and end-user network will be established to help disseminating and exploiting project results to meet user needs.

  6. The Bright, the Dark, and the Blue Face of Narcissism: The Spectrum of Narcissism in Its Relations to the Metatraits of Personality, Self-Esteem, and the Nomological Network of Shyness, Loneliness, and Empathy.

    PubMed

    Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M; Kwiatkowska, Katarzyna

    2018-01-01

    Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants ( N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits-as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face.

  7. The Bright, the Dark, and the Blue Face of Narcissism: The Spectrum of Narcissism in Its Relations to the Metatraits of Personality, Self-Esteem, and the Nomological Network of Shyness, Loneliness, and Empathy

    PubMed Central

    Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M.; Kwiatkowska, Katarzyna

    2018-01-01

    Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants (N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits—as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face. PMID:29593627

  8. Vulnerability-Based Critical Neurons, Synapses, and Pathways in the Caenorhabditis elegans Connectome

    PubMed Central

    Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D.; Jeong, Jaeseung

    2016-01-01

    Determining the fundamental architectural design of complex nervous systems will lead to significant medical and technological advances. Yet it remains unclear how nervous systems evolved highly efficient networks with near optimal sharing of pathways that yet produce multiple distinct behaviors to reach the organism’s goals. To determine this, the nematode roundworm Caenorhabditis elegans is an attractive model system. Progress has been made in delineating the behavioral circuits of the C. elegans, however, many details are unclear, including the specific functions of every neuron and synapse, as well as the extent the behavioral circuits are separate and parallel versus integrative and serial. Network analysis provides a normative approach to help specify the network design. We investigated the vulnerability of the Caenorhabditis elegans connectome by performing computational experiments that (a) “attacked” 279 individual neurons and 2,990 weighted synaptic connections (composed of 6,393 chemical synapses and 890 electrical junctions) and (b) quantified the effects of each removal on global network properties that influence information processing. The analysis identified 12 critical neurons and 29 critical synapses for establishing fundamental network properties. These critical constituents were found to be control elements—i.e., those with the most influence over multiple underlying pathways. Additionally, the critical synapses formed into circuit-level pathways. These emergent pathways provide evidence for (a) the importance of backward locomotion, avoidance behavior, and social feeding behavior to the organism; (b) the potential roles of specific neurons whose functions have been unclear; and (c) both parallel and serial design elements in the connectome—i.e., specific evidence for a mixed architectural design. PMID:27540747

  9. Impact analysis of two kinds of failure strategies in Beijing road transportation network

    NASA Astrophysics Data System (ADS)

    Zhang, Zundong; Xu, Xiaoyang; Zhang, Zhaoran; Zhou, Huijuan

    The Beijing road transportation network (BRTN), as a large-scale technological network, exhibits very complex and complicate features during daily periods. And it has been widely highlighted that how statistical characteristics (i.e. average path length and global network efficiency) change while the network evolves. In this paper, by using different modeling concepts, three kinds of network models of BRTN namely the abstract network model, the static network model with road mileage as weights and the dynamic network model with travel time as weights — are constructed, respectively, according to the topological data and the real detected flow data. The degree distribution of the three kinds of network models are analyzed, which proves that the urban road infrastructure network and the dynamic network behavior like scale-free networks. By analyzing and comparing the important statistical characteristics of three models under random attacks and intentional attacks, it shows that the urban road infrastructure network and the dynamic network of BRTN are both robust and vulnerable.

  10. A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sathanur, Arun V.; Haglin, David J.

    In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated human users while the model parameters for the edges are based on the existence of vulnerabilities between each pair of connected hosts. The edge models relate to the summary representationsmore » of the corresponding attack-graphs. This results in a formulation based on Random Walk with Restart (RWR) and the resulting centrality metric can be solved for in an efficient manner through the use of sparse linear solvers. Thus the formulation goes beyond mere topological considerations in centrality computations by summarizing the host profiles and the attack graphs into the model parameters. The computational efficiency of the method also allows us to also quantify the uncertainty in the centrality measure through Monte Carlo analysis.« less

  11. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  12. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  13. Transport Traffic Analysis for Abusive Infrastructure Characterization

    DTIC Science & Technology

    2012-12-14

    Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including

  14. 77 FR 67557 - Special Conditions: ATR-GIE Avions de Transport Regional, Models ATR42-500 and ATR72-212A...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-13

    ... to, or access by, external systems and networks may result in security vulnerabilities to the... configuration may allow the exploitation of network security vulnerabilities resulting in intentional or..., Models ATR42-500 and ATR72-212A Airplanes; Aircraft Electronic System Security Protection From...

  15. Day-Ahead Anticipation of Complex Network Vulnerability

    NASA Astrophysics Data System (ADS)

    Stefanov, S. Z.; Wang, Paul P.

    2017-11-01

    In this paper, a day-ahead anticipation of complex network vulnerability for an intentional threat of an attack or a shock is carried out. An ecological observer is introduced for that reason, which is a watch in the intentional multiverse, tiled by cells; dynamics of the intentional threat for a day-ahead is characterized by a space-time cell; spreading of the intentional threat is derived from its energy; duration of the intentional threat is found by the self-assembling of a space-time cell; the lower bound of probability is assessed to anticipate for a day-ahead the intentional threat; it is indicated that this vulnerability anticipation for a day-ahead is right when the intentional threat leads to dimension doubling of the complex network.

  16. Climate change and vulnerability of bull trout (Salvelinus confluentus) in a fire-prone landscape.

    USGS Publications Warehouse

    Falke, Jeffrey A.; Flitcroft, Rebecca L; Dunham, Jason B.; McNyset, Kristina M.; Hessburg, Paul F.; Reeves, Gordon H.

    2015-01-01

    Linked atmospheric and wildfire changes will complicate future management of native coldwater fishes in fire-prone landscapes, and new approaches to management that incorporate uncertainty are needed to address this challenge. We used a Bayesian network (BN) approach to evaluate population vulnerability of bull trout (Salvelinus confluentus) in the Wenatchee River basin, Washington, USA, under current and future climate and fire scenarios. The BN was based on modeled estimates of wildfire, water temperature, and physical habitat prior to, and following, simulated fires throughout the basin. We found that bull trout population vulnerability depended on the extent to which climate effects can be at least partially offset by managing factors such as habitat connectivity and fire size. Moreover, our analysis showed that local management can significantly reduce the vulnerability of bull trout to climate change given appropriate management actions. Tools such as our BN that explicitly integrate the linked nature of climate and wildfire, and incorporate uncertainty in both input data and vulnerability estimates, will be vital in effective future management to conserve native coldwater fishes.

  17. Network theory may explain the vulnerability of medieval human settlements to the Black Death pandemic.

    PubMed

    Gómez, José M; Verdú, Miguel

    2017-03-06

    Epidemics can spread across large regions becoming pandemics by flowing along transportation and social networks. Two network attributes, transitivity (when a node is connected to two other nodes that are also directly connected between them) and centrality (the number and intensity of connections with the other nodes in the network), are widely associated with the dynamics of transmission of pathogens. Here we investigate how network centrality and transitivity influence vulnerability to diseases of human populations by examining one of the most devastating pandemic in human history, the fourteenth century plague pandemic called Black Death. We found that, after controlling for the city spatial location and the disease arrival time, cities with higher values of both centrality and transitivity were more severely affected by the plague. A simulation study indicates that this association was due to central cities with high transitivity undergo more exogenous re-infections. Our study provides an easy method to identify hotspots in epidemic networks. Focusing our effort in those vulnerable nodes may save time and resources by improving our ability of controlling deadly epidemics.

  18. A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Purvine, Emilie AH; Johnson, John R.; Lo, Chaomei

    Most cyber network attacks begin with an adversary gain- ing a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signa- ture of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typ- ically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reach- ability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolvemore » over time. We use this reacha- bility graph to develop dynamic machine-level and network- level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.« less

  19. Resilience of networks to environmental stress: From regular to random networks

    NASA Astrophysics Data System (ADS)

    Eom, Young-Ho

    2018-04-01

    Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.

  20. The internet worm

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1989-01-01

    In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.

  1. Measuring the consequences of wildfires in a Bayesian network with vulnerability and exposure indicators

    NASA Astrophysics Data System (ADS)

    Papakosta, Panagiota; Botzler, Sebastian; Krug, Kai; Straub, Daniel

    2013-04-01

    Mediterranean climate type areas have always been experiencing fire events. However, population growth and expansion of urban centers into wildland areas during the 20th century (expansion of wildland-urban interface) has increased the threat to humans and their activities. Life and property losses, damage on infrastructure and crops, and forest degradation are some of the damages caused by wildfires. Although fires repeatedly occur along the Mediterranean basin, not all areas have experienced severe consequences. The extent of damage by wildfires is influenced by several factors, such as population density, vegetation type, topography, weather conditions and social preparedness [1]. Wildfire consequence estimation by means of vulnerability and exposure indicators is an essential part of wildfire risk analysis. Vulnerability indicators express the conditions that increase the susceptibility of a site to the impact of wildfires and exposure indicators describe the elements at risk [2],[3]. Appropriate indicators to measure wildfire vulnerability and exposure can vary with scale and site. The consequences can be classified into economic, social, environmental and safety, and they can be tangible (human life losses, buildings damaged) or intangible (damage of cultural heritage site). As a consequence, a variety of approaches exist and there is a lack of generalized unified easy-to-implement methodologies. In this study we present a methodology for measuring consequences of wildfires in a Mediterranean area in the mesoscale (1 km² spatial resolution). Vulnerability and exposure indicators covering all consequence levels are identified and their interrelations are stressed. Variables such as building materials, roofing type, and average building values are included in the economic vulnerability level. Safety exposure is expressed by population density, demographic structure, street density and distance to closest fire station. Environmental vulnerability of protected areas and rare species is also included. Presence of cultural heritage sites, power stations and power line network influence social exposure. The conceptual framework is demonstrated with a Bayesian Network (BN). The BN model incorporates empirical observation, physical models and expert knowledge; it can also explicitly account for uncertainty in the indicators. The proposed model is applied to the island of Cyprus. Maps support the demonstration of results. [1] Keeley, J.E.; Bond, W.J.; Bradstock, R.A.; Pausas, J.G.; Rundel, P.W. (2012): Fire in Mediterranean ecosystems: ecology, evolution and management. Cambridge University Press, New York, USA. [2] UN/ISDR (International Strategy for Disaster Reduction (2004): Living with Risk: A Global Review of Disaster Reduction Initiatives, Geneva, UN Publications. [3] Birkmann, J. (2006): Measuring vulnerability to natural hazards: towards disaster resilient societies. United Nations University Press, Tokyo, Japan.

  2. Vulnerability to shocks in the global seafood trade network

    NASA Astrophysics Data System (ADS)

    Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke

    2016-03-01

    Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

  3. Optimization of DRASTIC method by artificial neural network, nitrate vulnerability index, and composite DRASTIC models to assess groundwater vulnerability for unconfined aquifer of Shiraz Plain, Iran.

    PubMed

    Baghapour, Mohammad Ali; Fadaei Nobandegani, Amir; Talebbeydokhti, Nasser; Bagherzadeh, Somayeh; Nadiri, Ata Allah; Gharekhani, Maryam; Chitsazan, Nima

    2016-01-01

    Extensive human activities and unplanned land uses have put groundwater resources of Shiraz plain at a high risk of nitrate pollution, causing several environmental and human health issues. To address these issues, water resources managers utilize groundwater vulnerability assessment and determination of protection. This study aimed to prepare the vulnerability maps of Shiraz aquifer by using Composite DRASTIC index, Nitrate Vulnerability index, and artificial neural network and also to compare their efficiency. The parameters of the indexes that were employed in this study are: depth to water table, net recharge, aquifer media, soil media, topography, impact of the vadose zone, hydraulic conductivity, and land use. These parameters were rated, weighted, and integrated using GIS, and then, used to develop the risk maps of Shiraz aquifer. The results indicated that the southeastern part of the aquifer was at the highest potential risk. Given the distribution of groundwater nitrate concentrations from the wells in the underlying aquifer, the artificial neural network model offered greater accuracy compared to the other two indexes. The study concluded that the artificial neural network model is an effective model to improve the DRASTIC index and provides a confident estimate of the pollution risk. As intensive agricultural activities are the dominant land use and water table is shallow in the vulnerable zones, optimized irrigation techniques and a lower rate of fertilizers are suggested. The findings of our study could be used as a scientific basis in future for sustainable groundwater management in Shiraz plain.

  4. [Vulnerability and health problems while traveling: the viewpoint of the tourist in the city of Rio de Janeiro].

    PubMed

    Matos, Vanina; Barcellos, Christovam; Camargo, Luiz Octávio de Lima

    2013-01-01

    This article examines how a group of tourists perceives health issues related to safety, prevention and health care during their travels. Interviews were conducted with Brazilian tourists visiting the city of Rio de Janeiro, as well as local residents leaving the city on trips. The interviews were analyzed in accordance with the dimensions of vulnerability, information, prevention and health care, from which vulnerability emerged as a category of analysis. The reports of the trajectory of the tourists made it possible to identify problems and opportunities that could be used by the health sector for actions of prevention and promotion. The means of transport determines the trajectory of tourists and their security alternatives. Traveling in groups and visiting tourist attractions are seen as protective factors, which reinforces the role of information and social support networks as resources used by tourists in the absence of specific policies geared to this highly mobile and vulnerable population group.

  5. Resilience of developing brain networks to interictal epileptiform discharges is associated with cognitive outcome.

    PubMed

    Ibrahim, George M; Cassel, Daniel; Morgan, Benjamin R; Smith, Mary Lou; Otsubo, Hiroshi; Ochi, Ayako; Taylor, Margot; Rutka, James T; Snead, O Carter; Doesburg, Sam

    2014-10-01

    The effects of interictal epileptiform discharges on neurocognitive development in children with medically-intractable epilepsy are poorly understood. Such discharges may have a deleterious effect on the brain's intrinsic connectivity networks, which reflect the organization of functional networks at rest, and in turn on neurocognitive development. Using a combined functional magnetic resonance imaging-magnetoencephalography approach, we examine the effects of interictal epileptiform discharges on intrinsic connectivity networks and neurocognitive outcome. Functional magnetic resonance imaging was used to determine the location of regions comprising various intrinsic connectivity networks in 26 children (7-17 years), and magnetoencephalography data were reconstructed from these locations. Inter-regional phase synchronization was then calculated across interictal epileptiform discharges and graph theoretical analysis was applied to measure event-related changes in network topology in the peri-discharge period. The magnitude of change in network topology (network resilience/vulnerability) to interictal epileptiform discharges was associated with neurocognitive outcomes and functional magnetic resonance imaging networks using dual regression. Three main findings are reported: (i) large-scale network changes precede and follow interictal epileptiform discharges; (ii) the resilience of network topologies to interictal discharges is associated with stronger resting-state network connectivity; and (iii) vulnerability to interictal discharges is associated with worse neurocognitive outcomes. By combining the spatial resolution of functional magnetic resonance imaging with the temporal resolution of magnetoencephalography, we describe the effects of interictal epileptiform discharges on neurophysiological synchrony in intrinsic connectivity networks and establish the impact of interictal disruption of functional networks on cognitive outcome in children with epilepsy. The association between interictal discharges, network changes and neurocognitive outcomes suggests that it is of clinical importance to suppress discharges to foster more typical brain network development in children with focal epilepsy. © The Author (2014). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. How to Perform a Security Audit: Is Your School's or District's Network Vulnerable?

    ERIC Educational Resources Information Center

    Dark, Melissa; Poftak, Amy

    2004-01-01

    In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…

  7. A Vulnerability Assessment of the U.S. Small Business B2C E-Commerce Network Systems

    ERIC Educational Resources Information Center

    Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A.

    2011-01-01

    Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…

  8. Securing Information in the Healthcare Industry: Network Security, Incident Management, and Insider Threat

    DTIC Science & Technology

    2010-09-23

    Chris, ―An Analysis of Breaches Affecting 500 or More Individuals in Healthcare‖, HITRUST, August 2010. 2. ―2009 Annual Study: Cost of a Data Breach ,‖ Ponemon...penalties for willful neglect • Loss of human life? — While many concerns focus on a data breach , some vulnerabilities can be more severe

  9. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.

    Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less

  10. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    DOE PAGES

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; ...

    2017-03-20

    Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less

  11. Thermal analysis of combinatorial solid geometry models using SINDA

    NASA Technical Reports Server (NTRS)

    Gerencser, Diane; Radke, George; Introne, Rob; Klosterman, John; Miklosovic, Dave

    1993-01-01

    Algorithms have been developed using Monte Carlo techniques to determine the thermal network parameters necessary to perform a finite difference analysis on Combinatorial Solid Geometry (CSG) models. Orbital and laser fluxes as well as internal heat generation are modeled to facilitate satellite modeling. The results of the thermal calculations are used to model the infrared (IR) images of targets and assess target vulnerability. Sample analyses and validation are presented which demonstrate code products.

  12. Interfacing with in-Situ Data Networks during the Arctic Boreal Vulnerability Experiment (ABoVE)

    NASA Astrophysics Data System (ADS)

    McInerney, M.; Griffith, P. C.; Duffy, D.; Hoy, E.; Schnase, J. L.; Sinno, S.; Thompson, J. H.

    2014-12-01

    The Arctic Boreal Vulnerability Experiment (ABoVE) is designed to improve understanding of the causes and impacts of ecological changes in Arctic/boreal regions, and will integrate field-based studies, modeling, and data from airborne and satellite remote sensing. ABoVE will result in a fuller understanding of ecosystem vulnerability and resilience to environmental change in the Arctic and boreal regions of western North America, and provide scientific information required to develop options for societal responses to the impacts of these changes. The studies sponsored by NASA during ABoVE will be coordinated with research and in-situ monitoring activities being sponsored by a number of national and international partners. The NASA Center for Climate Simulation at the Goddard Space Flight Center has partnered with the NASA Carbon Cycle & Ecosystems Office to create a science cloud designed for this field campaign - the ABoVE Science Cloud (ASC). The ASC combines high performance computing with emerging technologies to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage with integrated data management, and integration of core variables from in-situ networks identified by the ABoVE Science Definition Team. In this talk, we will present the scientific requirements driving the development of the ABoVE Science Cloud, discuss the necessary interfaces, both computational and human, with in-situ monitoring networks, and show examples of how the ASC is being used to meet the needs of the ABoVE campaign.

  13. Analysis of the characteristics of the global virtual water trade network using degree and eigenvector centrality, with a focus on food and feed crops

    NASA Astrophysics Data System (ADS)

    Lee, Sang-Hyun; Mohtar, Rabi H.; Choi, Jin-Yong; Yoo, Seung-Hwan

    2016-10-01

    This study aims to analyze the characteristics of global virtual water trade (GVWT), such as the connectivity of each trader, vulnerable importers, and influential countries, using degree and eigenvector centrality during the period 2006-2010. The degree centrality was used to measure the connectivity, and eigenvector centrality was used to measure the influence on the entire GVWT network. Mexico, Egypt, China, the Republic of Korea, and Japan were classified as vulnerable importers, because they imported large quantities of virtual water with low connectivity. In particular, Egypt had a 15.3 Gm3 year-1 blue water saving effect through GVWT: the vulnerable structure could cause a water shortage problem for the importer. The entire GVWT network could be changed by a few countries, termed "influential traders". We used eigenvector centrality to identify those influential traders. In GVWT for food crops, the USA, Russian Federation, Thailand, and Canada had high eigenvector centrality with large volumes of green water trade. In the case of blue water trade, western Asia, Pakistan, and India had high eigenvector centrality. For feed crops, the green water trade in the USA, Brazil, and Argentina was the most influential. However, Argentina and Pakistan used high proportions of internal water resources for virtual water export (32.9 and 25.1 %); thus other traders should carefully consider water resource management in these exporters.

  14. Where to go? Strategic modelling of access to emergency shelters in Mozambique.

    PubMed

    Gall, Melanie

    2004-03-01

    This paper, through spatial-analysis techniques, examines the accessibility of emergency shelters for vulnerable populations, and outlines the benefits of an extended and permanently established shelter network in central Mozambique. The raster-based modelling approach considers data on land cover, locations of accommodation centres in 2000, settlements and infrastructure. The shelter analysis is a two-step process determining access for vulnerable communities first, followed by a suitability analysis for additional emergency shelter sites. The results indicate the need for both retrofitting existing infrastructure (schools, health posts) to function as shelters during an emergency, and constructing new facilities - at best multi-purpose facilities that can serve as social infrastructure and shelter. Besides assessing the current situation in terms of availability and accessibility of emergency shelters, this paper provides an example of evaluating the effectiveness of humanitarian assistance without conventional mechanisms like food tonnage and number of beneficiaries.

  15. Graphic health warnings as activators of social networks: A field experiment among individuals of low socioeconomic position.

    PubMed

    Ramanadhan, Shoba; Nagler, Rebekah H; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula

    2017-02-01

    Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Graphic health warnings as activators of social networks: A field experiment among individuals of low socioeconomic position

    PubMed Central

    Ramanadhan, Shoba; Nagler, Rebekah H.; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula

    2017-01-01

    Rationale Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). Objective The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Method Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. Results A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. Conclusion The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. PMID:28108053

  17. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  18. PeerShield: determining control and resilience criticality of collaborative cyber assets in networks

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2012-06-01

    As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.

  19. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks.

    PubMed

    Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua

    2014-05-07

    Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.

  20. Data security issues arising from integration of wireless access into healthcare networks.

    PubMed

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  1. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence.

    PubMed

    Korkali, Mert; Veneman, Jason G; Tivnan, Brian F; Bagrow, James P; Hines, Paul D H

    2017-03-20

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a "smart" power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  2. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    NASA Astrophysics Data System (ADS)

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-03-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  3. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    PubMed Central

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-01-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained. PMID:28317835

  4. A Typology to Explain Changing Social Networks Post Stroke.

    PubMed

    Northcott, Sarah; Hirani, Shashivadan P; Hilari, Katerina

    2018-05-08

    Social network typologies have been used to classify the general population but have not previously been applied to the stroke population. This study investigated whether social network types remain stable following a stroke, and if not, why some people shift network type. We used a mixed methods design. Participants were recruited from two acute stroke units. They completed the Stroke Social Network Scale (SSNS) two weeks and six months post stroke and in-depth interviews 8-15 months following the stroke. Qualitative data was analysed using Framework Analysis; k-means cluster analysis was applied to the six-month data set. Eighty-seven participants were recruited, 71 were followed up at six months, and 29 completed in-depth interviews. It was possible to classify all 29 participants into one of the following network types both prestroke and post stroke: diverse; friends-based; family-based; restricted-supported; restricted-unsupported. The main shift that took place post stroke was participants moving out of a diverse network into a family-based one. The friends-based network type was relatively stable. Two network types became more populated post stroke: restricted-unsupported and family-based. Triangulatory evidence was provided by k-means cluster analysis, which produced a cluster solution (for n = 71) with comparable characteristics to the network types derived from qualitative analysis. Following a stroke, a person's social network is vulnerable to change. Explanatory factors for shifting network type included the physical and also psychological impact of having a stroke, as well as the tendency to lose contact with friends rather than family.

  5. Associations between social vulnerabilities and psychosocial problems in European children. Results from the IDEFICS study.

    PubMed

    Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M; Bammann, Karin; De Henauw, Stefaan; Felső, Regina; Gwozdz, Wencke; Hunsberger, Monica; Reisch, Lucia; Russo, Paola; Tornaritis, Michael; Thumann, Barbara Franziska; Veidebaum, Toomas; Börnhorst, Claudia; Moreno, Luis A

    2017-09-01

    The effect of socioeconomic inequalities on children's mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial problems. 5987 children aged 2-9 years from eight European countries were assessed at baseline and 2-year follow-up. Two different instruments were employed to assess children's psychosocial problems: the KINDL (Questionnaire for Measuring Health-Related Quality of Life in Children and Adolescents) was used to evaluate children's well-being and the Strengths and Difficulties Questionnaire (SDQ) was used to evaluate children's internalising problems. Vulnerable groups were defined as follows: children whose parents had minimal social networks, children from non-traditional families, children of migrant origin or children with unemployed parents. Logistic mixed-effects models were used to assess the associations between social vulnerabilities and psychosocial problems. After adjusting for classical socioeconomic and lifestyle indicators, children whose parents had minimal social networks were at greater risk of presenting internalising problems at baseline and follow-up (OR 1.53, 99% CI 1.11-2.11). The highest risk for psychosocial problems was found in children whose status changed from traditional families at T0 to non-traditional families at T1 (OR 1.60, 99% CI 1.07-2.39) and whose parents had minimal social networks at both time points (OR 1.97, 99% CI 1.26-3.08). Children with one or more vulnerabilities accumulated were at a higher risk of developing psychosocial problems at baseline and follow-up. Therefore, policy makers should implement measures to strengthen the social support for parents with a minimal social network.

  6. A Meta-Analysis of Urban Climate Change Adaptation ...

    EPA Pesticide Factsheets

    The concentration of people, infrastructure, and ecosystem services in urban areas make them prime sites for climate change adaptation. While advances have been made in developing frameworks for adaptation planning and identifying both real and potential barriers to action, empirical work evaluating urban adaptation planning processes has been relatively piecemeal. Existing assessments of current experience with urban adaptation provide necessarily broad generalizations based on the available peer-reviewed literature. This paper uses a meta-analysis of U.S. cities’ current experience with urban adaptation planning drawing from 54 sources that include peer-reviewed literature, government reports, white papers, and reports published by non-governmental organizations. The analysis specifically evaluates the institutional support structures being developed for urban climate change adaptation. The results demonstrate that adaptation planning is driven by a desire to reduce vulnerability and often catalyzes new collaborations and coordination mechanisms in urban governance. As a result, building capacity for urban climate change adaptation planning requires a focus not only on city governments themselves but also on the complex horizontal and vertical networks that have arisen around such efforts. Existing adaptation planning often lacks attention to equity issues, social vulnerability, and the influence of non-climatic factors on vulnerability. Engaging city govern

  7. The Department of Defense energy vulnerabilities: Potential problems and observations

    NASA Astrophysics Data System (ADS)

    Freiwald, D. A.; Berger, M. E.; Roach, J. F.

    1982-08-01

    The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.

  8. Social Networks, Sexual Networks and HIV Risk in Men Who Have Sex with Men

    PubMed Central

    Amirkhanian, Yuri A.

    2014-01-01

    Worldwide, men who have sex with men (MSM) remain one of the most HIV-vulnerable community populations. A global public health priority is developing new methods of reaching MSM, understanding HIV transmission patterns, and intervening to reduce their risk. Increased attention is being given to the role that MSM networks play in HIV epidemiology. This review of MSM network research studies demonstrates that: (1) Members of the same social network often share similar norms, attitudes, and HIV risk behavior levels; (2) Network interventions are feasible and powerful for reducing unprotected sex and potentially for increasing HIV testing uptake; (3) HIV vulnerability among African American MSM increases when an individual enters a high-risk sexual network characterized by high density and racial homogeneity; and (4) Networks are primary sources of social support for MSM, particularly for those living with HIV, with greater support predicting higher care uptake and adherence. PMID:24384832

  9. Applications of network analysis for adaptive management of artificial drainage systems in landscapes vulnerable to sea level rise

    NASA Astrophysics Data System (ADS)

    Poulter, Benjamin; Goodall, Jonathan L.; Halpin, Patrick N.

    2008-08-01

    SummaryThe vulnerability of coastal landscapes to sea level rise is compounded by the existence of extensive artificial drainage networks initially built to lower water tables for agriculture, forestry, and human settlements. These drainage networks are found in landscapes with little topographic relief where channel flow is characterized by bi-directional movement across multiple time-scales and related to precipitation, wind, and tidal patterns. The current configuration of many artificial drainage networks exacerbates impacts associated with sea level rise such as salt-intrusion and increased flooding. This suggests that in the short-term, drainage networks might be managed to mitigate sea level rise related impacts. The challenge, however, is that hydrologic processes in regions where channel flow direction is weakly related to slope and topography require extensive parameterization for numerical models which is limited where network size is on the order of a hundred or more kilometers in total length. Here we present an application of graph theoretic algorithms to efficiently investigate network properties relevant to the management of a large artificial drainage system in coastal North Carolina, USA. We created a digital network model representing the observation network topology and four types of drainage features (canal, collector and field ditches, and streams). We applied betweenness-centrality concepts (using Dijkstra's shortest path algorithm) to determine major hydrologic flowpaths based off of hydraulic resistance. Following this, we identified sub-networks that could be managed independently using a community structure and modularity approach. Lastly, a betweenness-centrality algorithm was applied to identify major shoreline entry points to the network that disproportionately control water movement in and out of the network. We demonstrate that graph theory can be applied to solving management and monitoring problems associated with sea level rise for poorly understood drainage networks in advance of numerical methods.

  10. Cybersim: geographic, temporal, and organizational dynamics of malware propagation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Santhi, Nandakishore; Yan, Guanhua; Eidenbenz, Stephan

    2010-01-01

    Cyber-infractions into a nation's strategic security envelope pose a constant and daunting challenge. We present the modular CyberSim tool which has been developed in response to the need to realistically simulate at a national level, software vulnerabilities and resulting mal ware propagation in online social networks. CyberSim suite (a) can generate realistic scale-free networks from a database of geocoordinated computers to closely model social networks arising from personal and business email contacts and online communities; (b) maintains for each,bost a list of installed software, along with the latest published vulnerabilities; (d) allows designated initial nodes where malware gets introduced; (e)more » simulates, using distributed discrete event-driven technology, the spread of malware exploiting a specific vulnerability, with packet delay and user online behavior models; (f) provides a graphical visualization of spread of infection, its severity, businesses affected etc to the analyst. We present sample simulations on a national level network with millions of computers.« less

  11. Social network characteristics and HIV vulnerability among transgender persons in San Salvador: identifying opportunities for HIV prevention strategies.

    PubMed

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2012-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.

  12. Social Network Characteristics and HIV Vulnerability Among Transgender Persons in San Salvador: Identifying Opportunities for HIV Prevention Strategies

    PubMed Central

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2013-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents’ social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population. PMID:21538082

  13. Learning and robustness to catch-and-release fishing in a shark social network

    PubMed Central

    Brown, Culum; Planes, Serge

    2017-01-01

    Individuals can play different roles in maintaining connectivity and social cohesion in animal populations and thereby influence population robustness to perturbations. We performed a social network analysis in a reef shark population to assess the vulnerability of the global network to node removal under different scenarios. We found that the network was generally robust to the removal of nodes with high centrality. The network appeared also highly robust to experimental fishing. Individual shark catchability decreased as a function of experience, as revealed by comparing capture frequency and site presence. Altogether, these features suggest that individuals learnt to avoid capture, which ultimately increased network robustness to experimental catch-and-release. Our results also suggest that some caution must be taken when using capture–recapture models often used to assess population size as assumptions (such as equal probabilities of capture and recapture) may be violated by individual learning to escape recapture. PMID:28298593

  14. Complex social contagion makes networks more vulnerable to disease outbreaks.

    PubMed

    Campbell, Ellsworth; Salathé, Marcel

    2013-01-01

    Social network analysis is now widely used to investigate the dynamics of infectious disease spread. Vaccination dramatically disrupts disease transmission on a contact network, and indeed, high vaccination rates can potentially halt disease transmission altogether. Here, we build on mounting evidence that health behaviors - such as vaccination, and refusal thereof - can spread across social networks through a process of complex contagion that requires social reinforcement. Using network simulations that model health behavior and infectious disease spread, we find that under otherwise identical conditions, the process by which the health behavior spreads has a very strong effect on disease outbreak dynamics. This dynamic variability results from differences in the topology within susceptible communities that arise during the health behavior spreading process, which in turn depends on the topology of the overall social network. Our findings point to the importance of health behavior spread in predicting and controlling disease outbreaks.

  15. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    NASA Astrophysics Data System (ADS)

    Mohammadi, Hadi

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.

  16. Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches

    NASA Astrophysics Data System (ADS)

    Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea

    2017-04-01

    Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial dimension. According to the results using fuzzy operators, the analysis greatest weakness is the limited capacity to represent the relation among the different considered variables. The BBN approach, based on the definition of conditional probabilities, has allowed determining the trend of distributions of vulnerability along-shore, highlighting which parts of the coast are most likely to have higher or lower vulnerability than others. In BBN analysis, the greatest weakness emerge in the case of arbitrary definition of conditional probabilities (i.e. when there is a lack of information on the past hazardous events) because it is not possible to derive the individual contribution of each variable. As conclusion, the two approaches could be used together in the perspective of enhancing the multiple components in vulnerability assessment: the BBN as a preliminary assessment to provide a coarse description of the vulnerability distribution, and the Fuzzy Logic as an extended assessment to provide more space based information.

  17. A global picture of biological invasion threat on islands.

    PubMed

    Bellard, Céline; Rysman, Jean-François; Leroy, Boris; Claud, Chantal; Mace, Georgina M

    2017-12-01

    Biological invasions are among the main drivers of biodiversity losses. As threats from biological invasions increase, one of the most urgent tasks is to identify areas of high vulnerability. However, the lack of comprehensive information on the impacts of invasive alien species (IAS) is a problem especially on islands, where most of the recorded extinctions associated with IAS have occurred. Here we provide a global, network-oriented analysis of IAS on islands. Using network analysis, we structured 27,081 islands and 437 threatened vertebrates into 21 clusters, based on their profiles in term of invasiveness and shared vulnerabilities. These islands are mainly located in the Southern Hemisphere and many are in biodiversity hotspots. Some of the islands share similar characteristics regarding their connectivity that could be useful for understanding their response to invasive species. The major invaders found in these clusters of islands are feral cats, feral dogs, pigs and rats. Our analyses reveal those IAS that systematically act alone or in combination, and the pattern of shared IAS among threatened species, providing new information to implement effective eradication strategies. Combined with further local, contextual information this can contribute to global strategies to deal with IAS.

  18. Pleistocene megafaunal interaction networks became more vulnerable after human arrival.

    PubMed

    Pires, Mathias M; Koch, Paul L; Fariña, Richard A; de Aguiar, Marcus A M; dos Reis, Sérgio F; Guimarães, Paulo R

    2015-09-07

    The end of the Pleistocene was marked by the extinction of almost all large land mammals worldwide except in Africa. Although the debate on Pleistocene extinctions has focused on the roles of climate change and humans, the impact of perturbations depends on properties of ecological communities, such as species composition and the organization of ecological interactions. Here, we combined palaeoecological and ecological data, food-web models and community stability analysis to investigate if differences between Pleistocene and modern mammalian assemblages help us understand why the megafauna died out in the Americas while persisting in Africa. We show Pleistocene and modern assemblages share similar network topology, but differences in richness and body size distributions made Pleistocene communities significantly more vulnerable to the effects of human arrival. The structural changes promoted by humans in Pleistocene networks would have increased the likelihood of unstable dynamics, which may favour extinction cascades in communities facing extrinsic perturbations. Our findings suggest that the basic aspects of the organization of ecological communities may have played an important role in major extinction events in the past. Knowledge of community-level properties and their consequences to dynamics may be critical to understand past and future extinctions. © 2015 The Author(s).

  19. Pleistocene megafaunal interaction networks became more vulnerable after human arrival

    PubMed Central

    Pires, Mathias M.; Koch, Paul L.; Fariña, Richard A.; de Aguiar, Marcus A. M.; dos Reis, Sérgio F.; Guimarães, Paulo R.

    2015-01-01

    The end of the Pleistocene was marked by the extinction of almost all large land mammals worldwide except in Africa. Although the debate on Pleistocene extinctions has focused on the roles of climate change and humans, the impact of perturbations depends on properties of ecological communities, such as species composition and the organization of ecological interactions. Here, we combined palaeoecological and ecological data, food-web models and community stability analysis to investigate if differences between Pleistocene and modern mammalian assemblages help us understand why the megafauna died out in the Americas while persisting in Africa. We show Pleistocene and modern assemblages share similar network topology, but differences in richness and body size distributions made Pleistocene communities significantly more vulnerable to the effects of human arrival. The structural changes promoted by humans in Pleistocene networks would have increased the likelihood of unstable dynamics, which may favour extinction cascades in communities facing extrinsic perturbations. Our findings suggest that the basic aspects of the organization of ecological communities may have played an important role in major extinction events in the past. Knowledge of community-level properties and their consequences to dynamics may be critical to understand past and future extinctions. PMID:26336175

  20. Geo-ethical dimension of community's safety: rural and urban population vulnerability analysis methodology

    NASA Astrophysics Data System (ADS)

    Kostyuchenko, Yuriy; Movchan, Dmytro; Kopachevsky, Ivan; Yuschenko, Maxim

    2016-04-01

    Modern world based on relations more than on causalities, so communicative, socio-economic, and socio-cultural issues are important to understand nature of risks and to make correct, ethical decisions. Today major part of risk analysts declared new nature of modern risks. We faced coherent or systemic risks, realization of which leads to domino effect, unexpected growing of losses and fatalities. This type of risks originated by complicated nature of heterogeneous environment, close interconnection of engineering networks, and changing structure of society. Heterogeneous multi-agent environment generates systemic risks, which requires analyze multi-source data with sophisticated tools. Formal basis for analysis of this type of risks is developed during last 5-7 years. But issues of social fairness, ethics, and education require further development. One aspect of analysis of social issues of risk management is studied in this paper. Formal algorithm for quantitative analysis of multi-source data analysis is proposed. As it was demonstrated, using proposed methodological base and the algorithm, it is possible to obtain regularized spatial-temporal distribution of investigated parameters over whole observation period with rectified reliability and controlled uncertainty. The result of disaster data analysis demonstrates that about half of direct disaster damage might be caused by social factors: education, experience and social behaviour. Using data presented also possible to estimate quantitative parameters of the losses distributions: a relation between education, age, experience, and losses; as well as vulnerability (in terms of probable damage) toward financial status in current social density. It is demonstrated that on wide-scale range an education determines risk perception and so vulnerability of societies. But on the local level there are important heterogeneities. Land-use and urbanization structure influencing to vulnerability essentially. The way to calculate a distribution of losses connected with decision making in land-use is demonstrated. Rural community's vulnerability determines by water availability, quality of soils, effectiveness of land use (including climate change adaptation), intensity of pollutions, crop productivity variations during the period of crop rotation, annual national distribution of crops output, and distance to city centres. It should noted here that "distance to city centres" is not comprehensive indicator of market accessibility in general case: quality and availability of transport infrastructure should be described more detailed on the next stages of analysis. Urban population vulnerability determines by distribution of urban fractures and quality urban environment: density, quality and availability of infrastructure, balance between industrial, residential and recreational zones, effectiveness of urban land use and landscape management, and social policy, particularly, employment. Population density is closely connected with social density, with communications and decision making. Social learning, as the function of social communications, is the way to increase sustainability. Also it possible to say that social sustainability is a function of intensity and efficiency of communications between interlinked and interacted networks in the heterogeneous environment. Therefore the results of study demonstrated that risk management study should includes issues of risk and threats perception, which should be described in framework of appropriate tools and approaches connected with ethical dimension of vulnerability. For instance, problems of accessibility and availability of safety resources in view of social fairness and socio-economic dynamics should be included into future studies in field of risk analysis.

  1. Structural limitations of learning in a crowd: communication vulnerability and information diffusion in MOOCs.

    PubMed

    Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis

    2014-09-23

    Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the "significant" interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) "significant" peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly "global" exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education.

  2. Structural limitations of learning in a crowd: communication vulnerability and information diffusion in MOOCs

    PubMed Central

    Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis

    2014-01-01

    Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the “significant” interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) “significant” peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly “global” exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education. PMID:25244925

  3. Structural limitations of learning in a crowd: communication vulnerability and information diffusion in MOOCs

    NASA Astrophysics Data System (ADS)

    Gillani, Nabeel; Yasseri, Taha; Eynon, Rebecca; Hjorth, Isis

    2014-09-01

    Massive Open Online Courses (MOOCs) bring together a global crowd of thousands of learners for several weeks or months. In theory, the openness and scale of MOOCs can promote iterative dialogue that facilitates group cognition and knowledge construction. Using data from two successive instances of a popular business strategy MOOC, we filter observed communication patterns to arrive at the ``significant'' interaction networks between learners and use complex network analysis to explore the vulnerability and information diffusion potential of the discussion forums. We find that different discussion topics and pedagogical practices promote varying levels of 1) ``significant'' peer-to-peer engagement, 2) participant inclusiveness in dialogue, and ultimately, 3) modularity, which impacts information diffusion to prevent a truly ``global'' exchange of knowledge and learning. These results indicate the structural limitations of large-scale crowd-based learning and highlight the different ways that learners in MOOCs leverage, and learn within, social contexts. We conclude by exploring how these insights may inspire new developments in online education.

  4. Adolescent alcohol-related risk cognitions: the roles of social norms and social networking sites.

    PubMed

    Litt, Dana M; Stock, Michelle L

    2011-12-01

    The present study examined the impact of socially based descriptive norms on willingness to drink alcohol, drinker prototype favorability, affective alcohol attitudes, and perceived vulnerability for alcohol-related consequences within the Prototype Willingness model. Descriptive norms were manipulated by having 189 young adolescents view experimenter-created profile pages from the social networking site Facebook, which either showed older peers drinking or not. The results provided evidence that descriptive norms for alcohol use, as portrayed by Facebook profiles, significantly impact willingness to use, prototypes, attitudes toward use, and perceived vulnerability. A multiple mediation analysis indicated that prototypes, attitudes, and perceptions of use mediated the relationship between the content of the Facebook profile and willingness. These results indicate that adolescents who perceive that alcohol use is normative, as evidenced by Facebook profiles, are at higher risk for cognitions shown to predict alcohol use than adolescents who do not see alcohol use portrayed as frequently on Facebook.

  5. Global effects of local food-production crises: a virtual water perspective

    PubMed Central

    Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2016-01-01

    By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008–09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability. PMID:26804492

  6. Global effects of local food-production crises: a virtual water perspective.

    PubMed

    Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2016-01-25

    By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008-09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability.

  7. Global effects of local food-production crises: a virtual water perspective

    NASA Astrophysics Data System (ADS)

    Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2016-01-01

    By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008-09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability.

  8. Personal networks of women in residential and outpatient substance abuse treatment

    PubMed Central

    Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris

    2015-01-01

    This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t-tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse. PMID:27011762

  9. Personal networks of women in residential and outpatient substance abuse treatment.

    PubMed

    Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris

    This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t -tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse.

  10. Change Detection Algorithms for Information Assurance of Computer Networks

    DTIC Science & Technology

    2002-01-01

    original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the

  11. Roads at risk - the impact of debris flows on road network reliability and vulnerability in southern Norway

    NASA Astrophysics Data System (ADS)

    Meyer, Nele Kristin; Schwanghart, Wolfgang; Korup, Oliver

    2014-05-01

    Norwegian's road network is frequently affected by debris flows. Both damage repair and traffic interruption generate high economic losses and necessitate a rigorous assessment of where losses are expected to be high and where preventive measures should be focused on. In recent studies, we have developed susceptibility and trigger probability maps that serve as input into a hazard calculation at the scale of first-order watersheds. Here we combine these results with graph theory to assess the impact of debris flows on the road network of southern Norway. Susceptibility and trigger probability are aggregated for individual road sections to form a reliability index that relates to the failure probability of a link that connects two network vertices, e.g., road junctions. We define link vulnerability as a function of traffic volume and additional link failure distance. Additional link failure distance is the extra length of the alternative path connecting the two associated link vertices in case the network link fails and is calculated by a shortest-path algorithm. The product of network reliability and vulnerability indices represent the risk index. High risk indices identify critical links for the Norwegian road network and are investigated in more detail. Scenarios demonstrating the impact of single or multiple debris flow events are run for the most important routes between seven large cities in southern Norway. First results show that the reliability of the road network is lowest in the central and north-western part of the study area. Road network vulnerability is highest in the mountainous regions in central southern Norway where the road density is low and in the vicinity of cities where the traffic volume is large. The scenarios indicate that city connections that have their shortest path via routes crossing the central part of the study area have the highest risk of route failure.

  12. Individual Day-to-Day Process of Social Anxiety in Vulnerable College Students

    ERIC Educational Resources Information Center

    Campbell, Cynthia G.; Bierman, Karen L.; Molenaar, Peter C. M.

    2016-01-01

    Transitions requiring the creation of new social networks may be challenging for individuals vulnerable to social anxiety, which may hinder successful adjustment. Using person-specific methodology, this study examined social anxiety in vulnerable university freshman away from home during their first semester of college to understand how day-to-day…

  13. Evolving bipartite authentication graph partitions

    DOE PAGES

    Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.

    2017-01-16

    As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less

  14. Evolving bipartite authentication graph partitions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.

    As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less

  15. A common brain network links development, aging, and vulnerability to disease.

    PubMed

    Douaud, Gwenaëlle; Groves, Adrian R; Tamnes, Christian K; Westlye, Lars Tjelta; Duff, Eugene P; Engvig, Andreas; Walhovd, Kristine B; James, Anthony; Gass, Achim; Monsch, Andreas U; Matthews, Paul M; Fjell, Anders M; Smith, Stephen M; Johansen-Berg, Heidi

    2014-12-09

    Several theories link processes of development and aging in humans. In neuroscience, one model posits for instance that healthy age-related brain degeneration mirrors development, with the areas of the brain thought to develop later also degenerating earlier. However, intrinsic evidence for such a link between healthy aging and development in brain structure remains elusive. Here, we show that a data-driven analysis of brain structural variation across 484 healthy participants (8-85 y) reveals a largely--but not only--transmodal network whose lifespan pattern of age-related change intrinsically supports this model of mirroring development and aging. We further demonstrate that this network of brain regions, which develops relatively late during adolescence and shows accelerated degeneration in old age compared with the rest of the brain, characterizes areas of heightened vulnerability to unhealthy developmental and aging processes, as exemplified by schizophrenia and Alzheimer's disease, respectively. Specifically, this network, while derived solely from healthy subjects, spatially recapitulates the pattern of brain abnormalities observed in both schizophrenia and Alzheimer's disease. This network is further associated in our large-scale healthy population with intellectual ability and episodic memory, whose impairment contributes to key symptoms of schizophrenia and Alzheimer's disease. Taken together, our results suggest that the common spatial pattern of abnormalities observed in these two disorders, which emerge at opposite ends of the life spectrum, might be influenced by the timing of their separate and distinct pathological processes in disrupting healthy cerebral development and aging, respectively.

  16. User Vulnerability and its Reduction on a Social Networking Site

    DTIC Science & Technology

    2014-01-01

    social networking sites bring about new...and explore other users’ profiles and friend networks. Social networking sites have reshaped business models [Vayner- chuk 2009], provided platform... social networking sites is to enable users to be more social, user privacy and security issues cannot be ignored. On one hand, most social networking sites

  17. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts ofmore » a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.« less

  18. Prediction of groundwater inrush into coal mines from aquifers underlying the coal seams in China: application of vulnerability index method to Zhangcun Coal Mine, China

    NASA Astrophysics Data System (ADS)

    Wu, Qiang; Zhou, Wanfang; Wang, Jinhua; Xie, Shuhan

    2009-05-01

    Groundwater inrush is a geohazard that can significantly impact safe operations of the coal mines in China. Its occurrence is controlled by many factors and processes are often not amenable to mathematical expressions. To evaluate the water inrush risk, Professor Wu and his colleagues have proposed the vulnerability index approach by coupling the artificial neural network (ANN) and geographic information system (GIS). The detailed procedures of using this innovative approach are shown in a case study. Firstly, the powerful spatial data analysis functions of GIS was used to establish the thematic layer of each of the main factors that control the water inrush, and then to choose the training sample on the thematic layer with the ANN-BP Arithmetic. Secondly, the ANN evaluation model of the water inrush was established to determine the threshold value for each risk level with a histogram of the water inrush vulnerability index. As a result, the mine area was divided into four regions with different vulnerability levels and they served as the general guidelines for the mine operations.

  19. Robustness of Synchrony in Complex Networks and Generalized Kirchhoff Indices

    NASA Astrophysics Data System (ADS)

    Tyloo, M.; Coletta, T.; Jacquod, Ph.

    2018-02-01

    In network theory, a question of prime importance is how to assess network vulnerability in a fast and reliable manner. With this issue in mind, we investigate the response to external perturbations of coupled dynamical systems on complex networks. We find that for specific, nonaveraged perturbations, the response of synchronous states depends on the eigenvalues of the stability matrix of the unperturbed dynamics, as well as on its eigenmodes via their overlap with the perturbation vector. Once averaged over properly defined ensembles of perturbations, the response is given by new graph topological indices, which we introduce as generalized Kirchhoff indices. These findings allow for a fast and reliable method for assessing the specific or average vulnerability of a network against changing operational conditions, faults, or external attacks.

  20. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  1. The Role of Efficient XML Interchange (EXI) in Navy Wide-Area Network (WAN) Optimization

    DTIC Science & Technology

    2015-03-01

    compress, and re-encrypt data to continue providing optimization through compression; however, that capability requires careful consideration of...optimization 23 of encrypted data requires a careful analysis and comparison of performance improvements and IA vulnerabilities. It is important...Contained EXI capitalizes on multiple techniques to improve compression, and they vary depending on a set of EXI options passed to the codec

  2. Information Assurance Study

    DTIC Science & Technology

    1998-01-01

    usually written up by Logistics or Maintenance (4790 is the Maintenance “ Bible ”). If need be, and if resources are available, one could collect all...Public domain) SATAN (System Administration Tool for Analyzing Networks) (Public Domain) STAT ( Security Test and Analysis Tool) (Harris Corporation...Service-Filtering Tools 1. TCP/IP wrapper program • Tools to Scan Hosts for Known Vulnerabilities 1. ISS (Internet Security Scanner) 2. SATAN (Security

  3. Modeling economic and carbon consequences of a shift to wood-based energy in a rural 'cluster'; a network analysis in southeast Alaska

    Treesearch

    David Saah; Trista Patterson; Thomas Buchholz; David Ganz; David Albert; Keith Rush

    2014-01-01

    Integrated ecological and economic solutions are increasingly sought after by communities to provide basic energy needs such as home heating, transport, and electricity, while reducing drivers of and vulnerability to climate change. Small rural communities may require a coordinated approach to overcome the limitations of economies of scale. Low-carbon development...

  4. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  5. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  6. Configuration development for ROMENET

    NASA Astrophysics Data System (ADS)

    Rhue, Lawrence

    1989-10-01

    A plan prepared by RJO Enterprises and BBN Communications Corporation (BBNCC) for the design of ROMENET, a DDN-like testbed for the Rome Air Development Center (RADC) Wide Area Networks (WAN) laboratory is presented. The ROMENET is intended to provide RADC with the ability to test and evaluate the performance and vulnerability of the Defense Data Network (DDN) technologies in support of specific Major Command programs and activities at RADC. It will also support experimentation with packet switched network technologies and includes facilities to analytically evaluate the performance of the network and its associated equipment and media. In addition, ROMENET will provide a simulation vehicle for controlled interference or jamming into the media for vulnerability assessment. Through interfaces with the RADC Battle Management Laboratory (BML), ROMENET will allow the Air Force to assess the restorative and performance characteristics of the network under stressed conditions. The closed environment of ROMENET makes it ideal for creating and testing routing algorithms and network control protocols.

  7. Breakdown of interdependent directed networks.

    PubMed

    Liu, Xueming; Stanley, H Eugene; Gao, Jianxi

    2016-02-02

    Increasing evidence shows that real-world systems interact with one another via dependency connectivities. Failing connectivities are the mechanism behind the breakdown of interacting complex systems, e.g., blackouts caused by the interdependence of power grids and communication networks. Previous research analyzing the robustness of interdependent networks has been limited to undirected networks. However, most real-world networks are directed, their in-degrees and out-degrees may be correlated, and they are often coupled to one another as interdependent directed networks. To understand the breakdown and robustness of interdependent directed networks, we develop a theoretical framework based on generating functions and percolation theory. We find that for interdependent Erdős-Rényi networks the directionality within each network increases their vulnerability and exhibits hybrid phase transitions. We also find that the percolation behavior of interdependent directed scale-free networks with and without degree correlations is so complex that two criteria are needed to quantify and compare their robustness: the percolation threshold and the integrated size of the giant component during an entire attack process. Interestingly, we find that the in-degree and out-degree correlations in each network layer increase the robustness of interdependent degree heterogeneous networks that most real networks are, but decrease the robustness of interdependent networks with homogeneous degree distribution and with strong coupling strengths. Moreover, by applying our theoretical analysis to real interdependent international trade networks, we find that the robustness of these real-world systems increases with the in-degree and out-degree correlations, confirming our theoretical analysis.

  8. Cascading failures mechanism based on betweenness-degree ratio distribution with different connecting preferences

    NASA Astrophysics Data System (ADS)

    Wang, Xiao Juan; Guo, Shi Ze; Jin, Lei; Chen, Mo

    We study the structural robustness of the scale free network against the cascading failure induced by overload. In this paper, a failure mechanism based on betweenness-degree ratio distribution is proposed. In the cascading failure model we built the initial load of an edge which is proportional to the node betweenness of its ends. During the edge random deletion, we find a phase transition. Then based on the phase transition, we divide the process of the cascading failure into two parts: the robust area and the vulnerable area, and define the corresponding indicator to measure the performance of the networks in both areas. From derivation, we find that the vulnerability of the network is determined by the distribution of betweenness-degree ratio. After that we use the connection between the node ability coefficient and distribution of betweenness-degree ratio to explain the cascading failure mechanism. In simulations, we verify the correctness of our derivations. By changing connecting preferences, we find scale free networks with a slight assortativity, which performs better both in robust area and vulnerable area.

  9. Comparison of a traditional with a new approach based on Graph Theory to vulnerability assessment to natural hazards: a study case on a socio-economic complex system

    NASA Astrophysics Data System (ADS)

    Arosio, Marcello; Martina, Mario L. V.

    2017-04-01

    The emergent behaviour of the contemporary complex, socio-technical and interconnected society makes the collective risk greater than the sum of the parts and this requires a holistic, systematic and integrated approach. Although there have been major improvements in recent years, there are still some limitation in term of a holistic approach that is able to include the emergent value hidden in the connections between exposed elements and the interactions between the different spheres of the multi-hazards, vulnerability, exposure and resilience. To deal with these challenges it is necessary to consider the connections between the exposed elements (e.g. populations, schools, hospital, etc.) and to quantify the relative importance of the elements and their interconnections (e.g. the need of injured people to go to hospital or children to school). In a system (e.g. road, hospital and ecological network, etc.), or in a System of System (e.g. socio-technical urban service), there are critical elements that, beyond the intrinsic vulnerability, can be characterized by greater or lower vulnerability because of their physical, geographical, cyber or logical connections. To this aim, we propose in this study a comparative analysis between traditional reductionist approach and a new holistic approach to vulnerability assessment to natural hazards. The analysis considers a study case of a socio-economic complex system through an innovative approach based on the properties of graph G=(N,L). A graph consists of two sets N (nodes) and L (links): the nodes represent the single exposed elements (physical, social, environmental, etc.) to a hazard, while the links (or connections) represent the interaction between the elements. The final goal is to illustrate an application of this innovative approach of integrated collective vulnerability assessment.

  10. A Longitudinal Study of Social Relationships and Networks in the Transition to and within Adulthood for Vulnerable Young Adults at Ages 24, 29 and 34 Years: Compensation, Reinforcement or Cumulative Disadvantages?

    ERIC Educational Resources Information Center

    Bele, Irene Velsvik; Kvalsund, Rune

    2016-01-01

    This longitudinal study, spanning from 1995 through 2012, followed vulnerable youth from upper secondary school (T1) as they made the transition to their early twenties (T2), late twenties (T3) and mid-thirties (T4). We investigated their social network relationships in different phases of adult life, focusing mainly on factors that explain…

  11. Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure

    DTIC Science & Technology

    2012-09-01

    56 Clanton, “Oklahoma Oil Hub Helps Keep Oil Prices from Going Higher.” 57 Donald Furgeson, John Mahoney , and Brett Warfield...Vulnerability Assessment Matrix of the COTH.58 58 Furgeson, Mahoney , and Warfield, Security...Steinhäusler et al., “Security Risks to the Oil and Gas Industry: Terrorist Capabilities.” 71 Furgeson, Mahoney , and Warfield, Security Vulnerability

  12. Asset ownership among households caring for orphans and vulnerable children in rural Zimbabwe: The influence of ownership on children's health and social vulnerabilities

    PubMed Central

    Crea, Thomas M.; Lombe, Margaret; Robertson, Laura A.; Dumba, Lovemore; Mushati, Phyllis; Makoni, J.C.; Mavise, Gideon; Eaton, Jeffrey W.; Munatsi, Brighton; Nyamukapa, Constance A.; Gregson, Simon

    2012-01-01

    The high prevalence of human immunodeficiency virus/acquired immune deficiency syndrome in sub-Saharan Africa has resulted in a dramatic increase in orphans and vulnerable children (OVC) over the past decade. These children typically rely on extended family networks for support, but the magnitude of the crisis has resulted in traditional familial networks becoming overwhelmed and more economically and socially vulnerable. Previous research consistently demonstrates the positive influence of household asset ownership on children's well-being. Using data from impoverished households caring for OVC in rural Manicaland Province, Zimbabwe, this study explores the influence of household asset ownership on OVC health vulnerability (HV) and social vulnerability (SV). Findings indicate that asset ownership is associated with significantly lower SV, in terms of school attendance and birth registration. Yet, assets do not emerge as a direct influence of OVC HV as measured by disease and chronic illness, although having a chronically ill adult in the household increases HV. These findings suggest that asset ownership, specifically a combination of fixed and movable assets, may offset the influence of other risk factors for children's SV. PMID:22624868

  13. Asset ownership among households caring for orphans and vulnerable children in rural Zimbabwe: the influence of ownership on children's health and social vulnerabilities.

    PubMed

    Crea, Thomas M; Lombe, Margaret; Robertson, Laura A; Dumba, Lovemore; Mushati, Phyllis; Makoni, J C; Mavise, Gideon; Eaton, Jeffrey W; Munatsi, Brighton; Nyamukapa, Constance A; Gregson, Simon

    2013-01-01

    The high prevalence of human immunodeficiency virus/acquired immune deficiency syndrome in sub-Saharan Africa has resulted in a dramatic increase in orphans and vulnerable children (OVC) over the past decade. These children typically rely on extended family networks for support, but the magnitude of the crisis has resulted in traditional familial networks becoming overwhelmed and more economically and socially vulnerable. Previous research consistently demonstrates the positive influence of household asset ownership on children's well-being. Using data from impoverished households caring for OVC in rural Manicaland Province, Zimbabwe, this study explores the influence of household asset ownership on OVC health vulnerability (HV) and social vulnerability (SV). Findings indicate that asset ownership is associated with significantly lower SV, in terms of school attendance and birth registration. Yet, assets do not emerge as a direct influence of OVC HV as measured by disease and chronic illness, although having a chronically ill adult in the household increases HV. These findings suggest that asset ownership, specifically a combination of fixed and movable assets, may offset the influence of other risk factors for children's SV.

  14. A scoring mechanism for the rank aggregation of network robustness

    NASA Astrophysics Data System (ADS)

    Yazdani, Alireza; Dueñas-Osorio, Leonardo; Li, Qilin

    2013-10-01

    To date, a number of metrics have been proposed to quantify inherent robustness of network topology against failures. However, each single metric usually only offers a limited view of network vulnerability to different types of random failures and targeted attacks. When applied to certain network configurations, different metrics rank network topology robustness in different orders which is rather inconsistent, and no single metric fully characterizes network robustness against different modes of failure. To overcome such inconsistency, this work proposes a multi-metric approach as the basis of evaluating aggregate ranking of network topology robustness. This is based on simultaneous utilization of a minimal set of distinct robustness metrics that are standardized so to give way to a direct comparison of vulnerability across networks with different sizes and configurations, hence leading to an initial scoring of inherent topology robustness. Subsequently, based on the inputs of initial scoring a rank aggregation method is employed to allocate an overall ranking of robustness to each network topology. A discussion is presented in support of the presented multi-metric approach and its applications to more realistically assess and rank network topology robustness.

  15. Modelling the changing cumulative vulnerability to climate-related hazards for river basin management using a GIS-based multicriteria decision approach

    NASA Astrophysics Data System (ADS)

    Hung, Hung-Chih; Wu, Ju-Yu; Hung, Chih-Hsuan

    2017-04-01

    1. Background Asia-Pacific region is one of the most vulnerable areas of the world to climate-related hazards and extremes due to rapid urbanization and over-development in hazard-prone areas. It is thus increasingly recognized that the management of land use and reduction of hazard risk are inextricably linked. This is especially critical from the perspective of integrated river basin management. A range of studies has targeted existing vulnerability assessments. However, limited attention has been paid to the cumulative effects of multiple vulnerable factors and their dynamics faced by local communities. This study proposes a novel methodology to access the changing cumulative vulnerability to climate-related hazards, and to examine the relationship between the attraction factors relevant to the general process of urbanization and vulnerability variability with a focus on a river basin management unit. 2. Methods and data The methods applied in this study include three steps. First, using Intergovernmental Panel on Climate Change's (IPCC) approach, a Cumulative Vulnerability Assessment Framework (CVAF) is built with a goal to characterize and compare the vulnerability to climate-related hazards within river basin regions based on a composition of multiple indicators. We organize these indicator metrics into three categories: (1) hazard exposure; (2) socioeconomic sensitivity, and (3) adaptive capacity. Second, the CVAF is applied by combining a geographical information system (GIS)-based spatial statistics technique with a multicriteria decision analysis (MCDA) to assess and map the changing cumulative vulnerability, comparing conditions in 1996 and 2006 in Danshui River Basin, Taiwan. Third, to examine the affecting factors of vulnerability changing, we develop a Vulnerability Changing Model (VCM) using four attraction factors to reflect how the process of urban developments leads to vulnerability changing. The factors are transport networks, land uses, production values of industries, and infrastructures. We then conduct a regression analysis to test the VCM. To illustrate the proposed methodology, the data are collected from the National Science and Technology Center for Disaster Reduction, Taiwan as well as the National Land Use Investigation and official census statistics. 3. Results and policy implications Results of CVAF analysis demonstrate heterogeneous patterns of vulnerability in the region, and highlight trends of long-term changes. The vulnerable areas unfold as clustered patterns and spatial analogues across regions, rather than randomly distributed. Highest cumulative vulnerability is concentrated in densely populated and downstream reaches (such as Taipei City) of the Danshui River in both time periods. When examining the VCM, it indicates that upper stream and more remote areas generally show low vulnerability, increases are observed in some areas between 1996 and 2006 due to land use intensification, industrial and infrastructure expansion. These findings suggest that land use planning should consider the socioeconomic progression and infrastructure investment factors that contribute to urban sprawl and address current as well as future urban developments vulnerable to hazard risk transmission. The cumulative vulnerability assessment, mapping methods and modelling presented here can be applied to other climate change and hazard risks to highlight priority areas for further investigation and contribute towards improving river basin management.

  16. Assessing Urban Streets Network Vulnerability against Earthquake Using GIS - Case Study: 6TH Zone of Tehran

    NASA Astrophysics Data System (ADS)

    Rastegar, A.

    2017-09-01

    Great earthquakes cause huge damages to human life. Street networks vulnerability makes the rescue operation to encounter serious difficulties especially at the first 72 hours after the incident. Today, physical expansion and high density of great cities, due to narrow access roads, large distance from medical care centers and location at areas with high seismic risk, will lead to a perilous and unpredictable situation in case of the earthquake. Zone # 6 of Tehran, with 229,980 population (3.6% of city population) and 20 km2 area (3.2% of city area), is one of the main municipal zones of Tehran (Iran center of statistics, 2006). Major land-uses, like ministries, embassies, universities, general hospitals and medical centers, big financial firms and so on, manifest the high importance of this region on local and national scale. In this paper, by employing indexes such as access to medical centers, street inclusion, building and population density, land-use, PGA and building quality, vulnerability degree of street networks in zone #6 against the earthquake is calculated through overlaying maps and data in combination with IHWP method and GIS. This article concludes that buildings alongside the streets with high population and building density, low building quality, far to rescue centers and high level of inclusion represent high rate of vulnerability, compared with other buildings. Also, by moving on from north to south of the zone, the vulnerability increases. Likewise, highways and streets with substantial width and low building and population density hold little values of vulnerability.

  17. Vulnerability of European freshwater catchments to climate change.

    PubMed

    Markovic, Danijela; Carrizo, Savrina F; Kärcher, Oskar; Walz, Ariane; David, Jonathan N W

    2017-09-01

    Climate change is expected to exacerbate the current threats to freshwater ecosystems, yet multifaceted studies on the potential impacts of climate change on freshwater biodiversity at scales that inform management planning are lacking. The aim of this study was to fill this void through the development of a novel framework for assessing climate change vulnerability tailored to freshwater ecosystems. The three dimensions of climate change vulnerability are as follows: (i) exposure to climate change, (ii) sensitivity to altered environmental conditions and (iii) resilience potential. Our vulnerability framework includes 1685 freshwater species of plants, fishes, molluscs, odonates, amphibians, crayfish and turtles alongside key features within and between catchments, such as topography and connectivity. Several methodologies were used to combine these dimensions across a variety of future climate change models and scenarios. The resulting indices were overlaid to assess the vulnerability of European freshwater ecosystems at the catchment scale (18 783 catchments). The Balkan Lakes Ohrid and Prespa and Mediterranean islands emerge as most vulnerable to climate change. For the 2030s, we showed a consensus among the applied methods whereby up to 573 lake and river catchments are highly vulnerable to climate change. The anthropogenic disruption of hydrological habitat connectivity by dams is the major factor reducing climate change resilience. A gap analysis demonstrated that the current European protected area network covers <25% of the most vulnerable catchments. Practical steps need to be taken to ensure the persistence of freshwater biodiversity under climate change. Priority should be placed on enhancing stakeholder cooperation at the major basin scale towards preventing further degradation of freshwater ecosystems and maintaining connectivity among catchments. The catchments identified as most vulnerable to climate change provide preliminary targets for development of climate change conservation management and mitigation strategies. © 2017 John Wiley & Sons Ltd.

  18. Evaluating medical convenience in ethnic minority areas of Southwest China via road network vulnerability: a case study for Dehong autonomous prefecture.

    PubMed

    Wei, Xiaoyan; Liu, Xuejun; Cheng, Liang; Sun, Lele; Pan, Yingying; Zong, Wenwen

    2017-11-28

    Southwest China is home to more than 30 ethnic minority groups. Since most of these populations reside in mountainous areas, convenient access to medical services is an important metric of how well their livelihoods are being protected. This paper proposes a medical convenience index (MCI) and computation model for mountain residents, taking into account various conditions including topography, geology, and climate. Data on road networks were used for comprehensive evaluation from three perspectives: vulnerability, complexity, and accessibility. The model is innovative for considering road network vulnerability in mountainous areas, and proposing a method of evaluating road network vulnerability by measuring the impacts of debris flows based on only links. The model was used to compute and rank the respective MCIs for settlements of each ethnic population in the Dehong Dai and Jingpo Autonomous Prefecture of Yunnan Province, in 2009 and 2015. Data on the settlements over the two periods were also used to analyze the spatial differentiation of medical convenience levels within the study area. The medical convenience levels of many settlements improved significantly. 80 settlements were greatly improved, while another 103 showed slight improvement.Areas with obvious improvement were distributed in clusters, and mainly located in the southwestern part of Yingjiang County, northern Longchuan County, eastern Lianghe County, and the region where Lianghe and Longchuan counties and Mang City intersect. Development of the road network was found to be a major contributor to improvements in MCI for mountain residents over the six-year period.

  19. Connectome analysis for pre-operative brain mapping in neurosurgery

    PubMed Central

    Hart, Michael G.; Price, Stephen J.; Suckling, John

    2016-01-01

    Abstract Object: Brain mapping has entered a new era focusing on complex network connectivity. Central to this is the search for the connectome or the brains ‘wiring diagram’. Graph theory analysis of the connectome allows understanding of the importance of regions to network function, and the consequences of their impairment or excision. Our goal was to apply connectome analysis in patients with brain tumours to characterise overall network topology and individual patterns of connectivity alterations. Methods: Resting-state functional MRI data were acquired using multi-echo, echo planar imaging pre-operatively from five participants each with a right temporal–parietal–occipital glioblastoma. Complex networks analysis was initiated by parcellating the brain into anatomically regions amongst which connections were identified by retaining the most significant correlations between the respective wavelet decomposed time-series. Results: Key characteristics of complex networks described in healthy controls were preserved in these patients, including ubiquitous small world organization. An exponentially truncated power law fit to the degree distribution predicted findings of general network robustness to injury but with a core of hubs exhibiting disproportionate vulnerability. Tumours produced a consistent reduction in local and long-range connectivity with distinct patterns of connection loss depending on lesion location. Conclusions: Connectome analysis is a feasible and novel approach to brain mapping in individual patients with brain tumours. Applications to pre-surgical planning include identifying regions critical to network function that should be preserved and visualising connections at risk from tumour resection. In the future one could use such data to model functional plasticity and recovery of cognitive deficits. PMID:27447756

  20. Vulnerability of fuel distribution systems to hazards in coastal communities : final research report.

    DOT National Transportation Integrated Search

    2017-04-30

    Coastal communities are vulnerable to disruptions in their fuel distribution networks due to : tropical storms, hurricanes and associated flooding. These disruptions impact communities by : limiting fueling in the days following the storm potentially...

  1. Social Support Networks: An Underutilized Resource for the Prevention of HIV and other Sexually Transmitted Diseases among Hispanic/Latino Migrants and Immigrants.

    PubMed

    Painter, Thomas M

    2018-01-01

    Hispanic/Latino migrants and immigrants are vulnerable to infection by HIV and other sexually transmitted diseases (STDs). Participation in social support networks helps them cope with circumstances in the U.S. Studies of Hispanic/Latino migrants suggest that participation may also be protective against HIV/STD infection. However the studies do not satisfactorily explain how participation leads to protective actions, and recommend externally-induced interventions for HIV/STD prevention rather than incorporating the spontaneously occurring forms of social support they describe. Given the potential protective effects of support networks, a database search was conducted to ascertain the extent to which published HIV/STD prevention interventions for these populations incorporate their support networks. Very few interventions were identified and fewer still incorporate support networks. This commentary calls for research to understand more fully how support networks affect HIV/STD risks among Hispanic/Latino migrants and immigrants and identifies potential benefits of incorporating these networks in HIV/STD prevention for these vulnerable populations.

  2. Kinome-wide transcriptional profiling of uveal melanoma reveals new vulnerabilities to targeted therapeutics.

    PubMed

    Bailey, Fiona P; Clarke, Kim; Kalirai, Helen; Kenyani, Jenna; Shahidipour, Haleh; Falciani, Francesco; Coulson, Judy M; Sacco, Joseph J; Coupland, Sarah E; Eyers, Patrick A

    2018-03-01

    Metastatic uveal melanoma (UM) is invariably fatal, usually within a year of diagnosis. There are currently no effective therapies, and clinical studies employing kinase inhibitors have so far demonstrated limited success. This is despite common activating mutations in GNAQ/11 genes, which trigger signalling pathways that might predispose tumours to a variety of targeted drugs. In this study, we have profiled kinome expression network dynamics in various human ocular melanomas. We uncovered a shared transcriptional profile in human primary UM samples and across a variety of experimental cell-based models. The poor overall response of UM cells to FDA-approved kinase inhibitors contrasted with much higher sensitivity to the bromodomain inhibitor JQ1, a broad transcriptional repressor. Mechanistically, we identified a repressed FOXM1-dependent kinase subnetwork in JQ1-exposed cells that contained multiple cell cycle-regulated protein kinases. Consistently, we demonstrated vulnerability of UM cells to inhibitors of mitotic protein kinases within this network, including the investigational PLK1 inhibitor BI6727. We conclude that analysis of kinome-wide signalling network dynamics has the potential to reveal actionable drug targets and inhibitors of potential therapeutic benefit for UM patients. © 2017 The Authors. Pigment Cell & Melanoma Research Published by John Wiley & Sons.

  3. Cyber Security Assessment Report: Adventium Labs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-31

    Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.

  4. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  5. Robustness and Vulnerability of Networks with Dynamical Dependency Groups.

    PubMed

    Bai, Ya-Nan; Huang, Ning; Wang, Lei; Wu, Zhi-Xi

    2016-11-28

    The dependency property and self-recovery of failure nodes both have great effects on the robustness of networks during the cascading process. Existing investigations focused mainly on the failure mechanism of static dependency groups without considering the time-dependency of interdependent nodes and the recovery mechanism in reality. In this study, we present an evolving network model consisting of failure mechanisms and a recovery mechanism to explore network robustness, where the dependency relations among nodes vary over time. Based on generating function techniques, we provide an analytical framework for random networks with arbitrary degree distribution. In particular, we theoretically find that an abrupt percolation transition exists corresponding to the dynamical dependency groups for a wide range of topologies after initial random removal. Moreover, when the abrupt transition point is above the failure threshold of dependency groups, the evolving network with the larger dependency groups is more vulnerable; when below it, the larger dependency groups make the network more robust. Numerical simulations employing the Erdős-Rényi network and Barabási-Albert scale free network are performed to validate our theoretical results.

  6. Including Internet insurance as part of a hospital computer network security plan.

    PubMed

    Riccardi, Ken

    2002-01-01

    Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.

  7. Low carbon technology performance vs infrastructure vulnerability: analysis through the local and global properties space.

    PubMed

    Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K

    2014-11-04

    Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.

  8. Integrated assessment of urban vulnerability and resilience. Case study: Targu Ocna town, Romania

    NASA Astrophysics Data System (ADS)

    Grozavu, Adrian; Bănică, Alexandru

    2015-04-01

    Vulnerability assessment frequently emphasizes the internal fragility of a system in relation to a given hazard, when compared to similar systems or to a reference standard. This internal fragility, either biophysical or structural, may affect the ability to predict, to prepare for and cope with or to recover from the manifestation of a risk phenomenon. Thus, the vulnerability is highly related to resilience and adaptability. There is no single methodology for vulnerability and resilience analysis, their assessment can only be made by identifying and integrating indicators which are compatible with the analysis level and the geographic, economic and social features of a certain area. An integrated model of evaluating vulnerability and resilience capacity is being proposed in this paper for Targu Ocna, a small mining settlement in the Eastern Carpathians of Romania, that became in the last years a tourist town and acts within the surrounding territory as a dynamic local pole. Methodologically, the following steps and operations were considered: identifying potential hazards, identifying elements at risk, identifying proper indicators and integrating them in order to evaluate the general vulnerability and resilience. The inventory of elements at risk (the number of people potentially affected, residential or other functionalities buildings, roads and other infrastructure elements etc.) was made based on General Urban Plan, topographic maps (scale 1:5000), ortophotos from 2003 and 2008 and field mapping and researches. Further on, several vulnerability indicators were identified and included within the analytical approach: dependency ratio, income, quality of the habitat and technical urban facilities, environment quality showing differentiated sensitivity. Issues such as preparedness and preventive measures (priority areas within the risk prevention plans), coping ability (networks' geometry and connectivity, emergency utilities and services accessibility) and the recovering capacity (the time needed to reestablish functions after a disastrous event) were also taken into account. The selected indicators were mathematically processed (standardized and normalized) in order to maximize their relevance and to unitary express the results in the spread 0-1. Then a grid with a cell size of 100 x 100 m was created in order to spatialize vulnerability indicators, that were calculated as the average vulnerability of the exposed elements in each cell. All identified indicators have been processed within a cluster analysis that permitted the identification of similar areas in terms of vulnerabilities. Finally, a general index was obtained by the integration of all vulnerability factors in an equation based on the geometric mean. The results of the study could provide a reference basis to substantiate local correctly prioritized decisions for reducing vulnerability by mitigation and adaptation measures in order to avoid significant damages when risks materialise.

  9. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  10. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  11. Using Organizational Network Analysis to Plan Cancer Screening Programs for Vulnerable Populations

    PubMed Central

    Carothers, Bobbi J.; Lofters, Aisha K.

    2014-01-01

    Objectives. We examined relationships among organizations in a cancer screening network to inform the development of interventions to improve cancer screening for South Asians living in the Peel region of Ontario. Methods. From April to July 2012, we surveyed decision-makers, program managers, and program staff in 22 organizations in the South Asian cancer screening network in the Peel region. We used a network analytic approach to evaluate density (range = 0%–100%, number of ties among organizations in the network expressed as a percentage of all possible ties), centralization (range = 0–1, the extent of variability in centrality), and node characteristics for the communication, collaboration, and referral networks. Results. Density was similar across communication (15%), collaboration (17%), and referral (19%) networks. Centralization was greater in the collaboration network (0.30) than the communication network (0.24), and degree centralization was greater in the inbound (0.42) than the outbound (0.37) referral network. Diverse organizations were central to the networks. Conclusions. Certain organizations were unexpectedly important to the South Asian cancer screening network. Program planning was informed by identifying opportunities to strengthen linkages between key organizations and to leverage existing ties. PMID:24328613

  12. Using organizational network analysis to plan cancer screening programs for vulnerable populations.

    PubMed

    Lobb, Rebecca; Carothers, Bobbi J; Lofters, Aisha K

    2014-02-01

    We examined relationships among organizations in a cancer screening network to inform the development of interventions to improve cancer screening for South Asians living in the Peel region of Ontario. From April to July 2012, we surveyed decision-makers, program managers, and program staff in 22 organizations in the South Asian cancer screening network in the Peel region. We used a network analytic approach to evaluate density (range = 0%-100%, number of ties among organizations in the network expressed as a percentage of all possible ties), centralization (range = 0-1, the extent of variability in centrality), and node characteristics for the communication, collaboration, and referral networks. Density was similar across communication (15%), collaboration (17%), and referral (19%) networks. Centralization was greater in the collaboration network (0.30) than the communication network (0.24), and degree centralization was greater in the inbound (0.42) than the outbound (0.37) referral network. Diverse organizations were central to the networks. Certain organizations were unexpectedly important to the South Asian cancer screening network. Program planning was informed by identifying opportunities to strengthen linkages between key organizations and to leverage existing ties.

  13. Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks

    NASA Astrophysics Data System (ADS)

    Bhatia, U.; Ganguly, A. R.

    2015-12-01

    Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.

  14. Flood impacts on a water distribution network

    NASA Astrophysics Data System (ADS)

    Arrighi, Chiara; Tarani, Fabio; Vicario, Enrico; Castelli, Fabio

    2017-12-01

    Floods cause damage to people, buildings and infrastructures. Water distribution systems are particularly exposed, since water treatment plants are often located next to the rivers. Failure of the system leads to both direct losses, for instance damage to equipment and pipework contamination, and indirect impact, since it may lead to service disruption and thus affect populations far from the event through the functional dependencies of the network. In this work, we present an analysis of direct and indirect damages on a drinking water supply system, considering the hazard of riverine flooding as well as the exposure and vulnerability of active system components. The method is based on interweaving, through a semi-automated GIS procedure, a flood model and an EPANET-based pipe network model with a pressure-driven demand approach, which is needed when modelling water distribution networks in highly off-design conditions. Impact measures are defined and estimated so as to quantify service outage and potential pipe contamination. The method is applied to the water supply system of the city of Florence, Italy, serving approximately 380 000 inhabitants. The evaluation of flood impact on the water distribution network is carried out for different events with assigned recurrence intervals. Vulnerable elements exposed to the flood are identified and analysed in order to estimate their residual functionality and to simulate failure scenarios. Results show that in the worst failure scenario (no residual functionality of the lifting station and a 500-year flood), 420 km of pipework would require disinfection with an estimated cost of EUR 21 million, which is about 0.5 % of the direct flood losses evaluated for buildings and contents. Moreover, if flood impacts on the water distribution network are considered, the population affected by the flood is up to 3 times the population directly flooded.

  15. Multivariate probability distribution for sewer system vulnerability assessment under data-limited conditions.

    PubMed

    Del Giudice, G; Padulano, R; Siciliano, D

    2016-01-01

    The lack of geometrical and hydraulic information about sewer networks often excludes the adoption of in-deep modeling tools to obtain prioritization strategies for funds management. The present paper describes a novel statistical procedure for defining the prioritization scheme for preventive maintenance strategies based on a small sample of failure data collected by the Sewer Office of the Municipality of Naples (IT). Novelty issues involve, among others, considering sewer parameters as continuous statistical variables and accounting for their interdependences. After a statistical analysis of maintenance interventions, the most important available factors affecting the process are selected and their mutual correlations identified. Then, after a Box-Cox transformation of the original variables, a methodology is provided for the evaluation of a vulnerability map of the sewer network by adopting a joint multivariate normal distribution with different parameter sets. The goodness-of-fit is eventually tested for each distribution by means of a multivariate plotting position. The developed methodology is expected to assist municipal engineers in identifying critical sewers, prioritizing sewer inspections in order to fulfill rehabilitation requirements.

  16. [Violence against children and adolescents with disabilities: narratives with guardianship councilors].

    PubMed

    Moreira, Martha Cristina Nunes; Bastos, Olga Maria; Bastos, Liliana Cabral; Soares, Ana Helena Rotta; Souza, Waldir da Silva; Sanchez, Rachel Niskier

    2014-09-01

    The article is based on Thompson's indepth hermeneutics with emphasis on meanings produced from narrative analysis of 15 guardianship councilors, seeking to interpret the significance of the councilor's function and ensuring the rights of children and adolescents with disabilities. The conclusion drawn is that certain generic discourses on this theme are presented as an inflexible core which reinforces the invisibility of the population and renders it more vulnerable. At the other extreme, the generic category of being "special" highlights the difficulties of the guardianship councilor in seeking strategies in the institutional network (health, leisure, education) for ensuring the rights and needs of this segment and their families, when failing to differentiate between the various categories of disability. Finally, the acquisition of knowledge by counselors related to this clientele depends greatly on the proximity of these counselors to health institutions that contribute in formulating strategies for guaranteeing rights that form networks. The situations of vulnerability to which counselors are exposed in the relationship between their mandate to respond to the violations suffered by the juvenile segment, and impotence to resolve them are stressed.

  17. Vulnerable salvation: Evangelical Protestant leaders and institutions, drug use and HIV and AIDS in the urban periphery of Rio de Janeiro

    PubMed Central

    Garcia, Jonathan; Muñoz-Laboy, Miguel; Parker, Richard

    2011-01-01

    This analysis focuses on the evangelical Protestant responses to drug use and HIV prevention, treatment and care in the urban periphery of Rio de Janeiro. We question how religious institutions, and the positions of pastors, create or reduce various elements of societal illness and vulnerability. We aim to show that the views of pastors may symbolise a form of social regulation that may have a meaningful social impact on drug use and HIV and AIDS. The interviews of 23 evangelical religious leaders were collected using a theoretical sample and analysed through a grounded theory approach. Two case studies of evangelical drug rehabilitation centres are derived from five qualitative interviews. Evangelical drug rehabilitation centres generally reflect pastors' discourses of reintegration into social networks including marriage, family, and employment. We found important differences in the discourses and practices in private versus state-funded rehabilitation centres that may reveal ways social and programmatic vulnerabilities may affect the efficacy of public health interventions. PMID:21512922

  18. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    PubMed

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  19. Error and attack tolerance of complex networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Jeong, Hawoong; Barabási, Albert-László

    2000-07-01

    Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.

  20. Beyond network structure: How heterogeneous susceptibility modulates the spread of epidemics.

    PubMed

    Smilkov, Daniel; Hidalgo, Cesar A; Kocarev, Ljupco

    2014-04-25

    The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that-for the SIS model-differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree and susceptibility are positive, and less vulnerable when this correlation is negative. Moreover, we show that networks become more likely to contain a pocket of infection when individuals are more likely to connect with others that have similar susceptibility (the network is segregated). These results show that the failure to include differential susceptibility to epidemic models can lead to a systematic over/under estimation of fundamental epidemic parameters when the structure of the networks is not independent from the susceptibility of the nodes or when there are correlations between the susceptibility of connected individuals.

  1. Beyond network structure: How heterogeneous susceptibility modulates the spread of epidemics

    PubMed Central

    Smilkov, Daniel; Hidalgo, Cesar A.; Kocarev, Ljupco

    2014-01-01

    The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that–for the SIS model–differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree and susceptibility are positive, and less vulnerable when this correlation is negative. Moreover, we show that networks become more likely to contain a pocket of infection when individuals are more likely to connect with others that have similar susceptibility (the network is segregated). These results show that the failure to include differential susceptibility to epidemic models can lead to a systematic over/under estimation of fundamental epidemic parameters when the structure of the networks is not independent from the susceptibility of the nodes or when there are correlations between the susceptibility of connected individuals. PMID:24762621

  2. Network analysis for science and technology management: Evidence from tuberculosis research in Fiocruz, Brazil

    PubMed Central

    da Silva, Marcus Vinicius Pereira; de Araújo, Kizi Mendonça; Sampaio, Ricardo Barros; Moraes, Milton Ozório

    2017-01-01

    Collaborative networks are of great value for science and technology (S&T) institutions as a way of sharing, generating and disseminating new knowledge that could ultimately lead to innovations. Driven by the need to assess the contribution and effectiveness of these networks in informing S&T management, we explored the evolution and dynamics of tuberculosis scientific networks involving the Oswaldo Cruz Foundation (Fiocruz), the major public health S&T Institution in Brazil. Social network analysis (SNA) was used to produce a 10-year (2005–2009, 2010–2014) retrospective longitudinal mapping of Brazilian tuberculosis research networks within the country and internationally, highlighting Fiocruz collaborations. Co-authorship analysis showed a significant expansion of collaboration in Brazil and the role of Fiocruz and other leading national institutions in maintaining connectivity, facilitating knowledge exchange and reducing network vulnerability. It also identified influential researchers that can act as information leaders and support strategic decisions. When we focused on networks inside the institution, the analysis showed a clear discontinuation between the clinical and the public health research areas, which needs specific internal policies to improve collaborations since outcomes in TB are expected to provide better diagnostic tools and more effective treatments. The approach provides evidence to support S&T management by pinpointing: key central institutions maintaining network connectivity; most influential researchers that can act as advisors/experts for investment and induction policies; key Fiocruz researchers that could improve information exchange, systems integration and innovation within the institution; opportunities for synergy between internal research groups working in complementary areas. In summary, we observed that SNA parameters proved to be a valuable tool that, along with other indicators, can strengthen knowledge platforms to support S&T management efforts. PMID:28792514

  3. Understanding resilience in industrial symbiosis networks: insights from network analysis.

    PubMed

    Chopra, Shauhrat S; Khanna, Vikas

    2014-08-01

    Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Social Media: Strategic Asset or Operational Vulnerability?

    DTIC Science & Technology

    2012-05-04

    Marine Corps message indicated that social networking sites “are particularly high risk due to information exposure, user generated content, and...Immediate Ban of Internet Social Networking Sites on Marine Corps Enterprise Network NIPRNET,” U.S. Marine Corps, accessed April 3, 2012, http... networking sites via the DoD’s unclassified computer network. The memorandum provided guidance on official use of social networking sites as well

  5. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  6. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  7. CAD-DRASTIC: chloride application density combined with DRASTIC for assessing groundwater vulnerability to road salt application

    NASA Astrophysics Data System (ADS)

    Salek, Mansour; Levison, Jana; Parker, Beth; Gharabaghi, Bahram

    2018-06-01

    Road salt is pervasively used throughout Canada and in other cold regions during winter. For cities relying exclusively on groundwater, it is important to plan and minimize the application of salt accordingly to mitigate the adverse effects of high chloride concentrations in water supply aquifers. The use of geospatial data (road network, land use, Quaternary and bedrock geology, average annual recharge, water-table depth, soil distribution, topography) in the DRASTIC methodology provides an efficient way of distinguishing salt-vulnerable areas associated with groundwater supply wells, to aid in the implementation of appropriate management practices for road salt application in urban areas. This research presents a GIS-based methodology to accomplish a vulnerability analysis for 12 municipal water supply wells within the City of Guelph, Ontario, Canada. The chloride application density (CAD) value at each supply well is calculated and related to the measured groundwater chloride concentrations and further combined with soil media and aquifer vadose- and saturated-zone properties used in DRASTIC. This combined approach, CAD-DRASTIC, is more accurate than existing groundwater vulnerability mapping methods and can be used by municipalities and other water managers to further improve groundwater protection related to road salt application.

  8. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  9. A negative genetic interaction map in isogenic cancer cell lines reveals cancer cell vulnerabilities

    PubMed Central

    Vizeacoumar, Franco J; Arnold, Roland; Vizeacoumar, Frederick S; Chandrashekhar, Megha; Buzina, Alla; Young, Jordan T F; Kwan, Julian H M; Sayad, Azin; Mero, Patricia; Lawo, Steffen; Tanaka, Hiromasa; Brown, Kevin R; Baryshnikova, Anastasia; Mak, Anthony B; Fedyshyn, Yaroslav; Wang, Yadong; Brito, Glauber C; Kasimer, Dahlia; Makhnevych, Taras; Ketela, Troy; Datti, Alessandro; Babu, Mohan; Emili, Andrew; Pelletier, Laurence; Wrana, Jeff; Wainberg, Zev; Kim, Philip M; Rottapel, Robert; O'Brien, Catherine A; Andrews, Brenda; Boone, Charles; Moffat, Jason

    2013-01-01

    Improved efforts are necessary to define the functional product of cancer mutations currently being revealed through large-scale sequencing efforts. Using genome-scale pooled shRNA screening technology, we mapped negative genetic interactions across a set of isogenic cancer cell lines and confirmed hundreds of these interactions in orthogonal co-culture competition assays to generate a high-confidence genetic interaction network of differentially essential or differential essentiality (DiE) genes. The network uncovered examples of conserved genetic interactions, densely connected functional modules derived from comparative genomics with model systems data, functions for uncharacterized genes in the human genome and targetable vulnerabilities. Finally, we demonstrate a general applicability of DiE gene signatures in determining genetic dependencies of other non-isogenic cancer cell lines. For example, the PTEN−/− DiE genes reveal a signature that can preferentially classify PTEN-dependent genotypes across a series of non-isogenic cell lines derived from the breast, pancreas and ovarian cancers. Our reference network suggests that many cancer vulnerabilities remain to be discovered through systematic derivation of a network of differentially essential genes in an isogenic cancer cell model. PMID:24104479

  10. An integrated risk and vulnerability assessment framework for climate change and malaria transmission in East Africa.

    PubMed

    Onyango, Esther Achieng; Sahin, Oz; Awiti, Alex; Chu, Cordia; Mackey, Brendan

    2016-11-11

    Malaria is one of the key research concerns in climate change-health relationships. Numerous risk assessments and modelling studies provide evidence that the transmission range of malaria will expand with rising temperatures, adversely impacting on vulnerable communities in the East African highlands. While there exist multiple lines of evidence for the influence of climate change on malaria transmission, there is insufficient understanding of the complex and interdependent factors that determine the risk and vulnerability of human populations at the community level. Moreover, existing studies have had limited focus on the nature of the impacts on vulnerable communities or how well they are prepared to cope. In order to address these gaps, a systems approach was used to present an integrated risk and vulnerability assessment framework for studies of community level risk and vulnerability to malaria due to climate change. Drawing upon published literature on existing frameworks, a systems approach was applied to characterize the factors influencing the interactions between climate change and malaria transmission. This involved structural analysis to determine influential, relay, dependent and autonomous variables in order to construct a detailed causal loop conceptual model that illustrates the relationships among key variables. An integrated assessment framework that considers indicators of both biophysical and social vulnerability was proposed based on the conceptual model. A major conclusion was that this integrated assessment framework can be implemented using Bayesian Belief Networks, and applied at a community level using both quantitative and qualitative methods with stakeholder engagement. The approach enables a robust assessment of community level risk and vulnerability to malaria, along with contextually relevant and targeted adaptation strategies for dealing with malaria transmission that incorporate both scientific and community perspectives.

  11. A new GIS-based tsunami risk evaluation: MeTHuVA (METU tsunami human vulnerability assessment) at Yenikapı, Istanbul

    NASA Astrophysics Data System (ADS)

    Cankaya, Zeynep Ceren; Suzen, Mehmet Lutfi; Yalciner, Ahmet Cevdet; Kolat, Cagil; Zaytsev, Andrey; Aytore, Betul

    2016-07-01

    Istanbul is a mega city with various coastal utilities located on the northern coast of the Sea of Marmara. At Yenikapı, there are critical vulnerable coastal utilities, structures, and active metropolitan life. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, waterfront commercial and/or recreational structures with residential/commercial areas and public utility areas are some examples of coastal utilization that are vulnerable to marine disasters. Therefore, the tsunami risk in the Yenikapı region is an important issue for Istanbul. In this study, a new methodology for tsunami vulnerability assessment for areas susceptible to tsunami is proposed, in which the Yenikapı region is chosen as a case study. Available datasets from the Istanbul Metropolitan Municipality and Turkish Navy are used as inputs for high-resolution GIS-based multi-criteria decision analysis (MCDA) evaluation of tsunami risk in Yenikapı. Bathymetry and topography database is used for high-resolution tsunami numerical modeling where the tsunami hazard, in terms of coastal inundation, is deterministically computed using the NAMI DANCE numerical code, considering earthquake worst case scenarios. In order to define the tsunami human vulnerability of the region, two different aspects, vulnerability at location and evacuation resilience maps were created using the analytical hierarchical process (AHP) method of MCDA. A vulnerability at location map is composed of metropolitan use, geology, elevation, and distance from shoreline layers, whereas an evacuation resilience map is formed by slope, distance within flat areas, distance to buildings, and distance to road networks layers. The tsunami risk map is then computed by the proposed new relationship which uses flow depth maps, vulnerability at location maps, and evacuation resilience maps.

  12. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    PubMed

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.

  13. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  14. A prototype forensic toolkit for industrial-control-systems incident response

    NASA Astrophysics Data System (ADS)

    Carr, Nickolas B.; Rowe, Neil C.

    2015-05-01

    Industrial control systems (ICSs) are an important part of critical infrastructure in cyberspace. They are especially vulnerable to cyber-attacks because of their legacy hardware and software and the difficulty of changing it. We first survey the history of intrusions into ICSs, the more serious of which involved a continuing adversary presence on an ICS network. We discuss some common vulnerabilities and the categories of possible attacks, noting the frequent use of software written a long time ago. We propose a framework for designing ICS incident response under the constraints that no new software must be required and that interventions cannot impede the continuous processing that is the norm for such systems. We then discuss a prototype toolkit we built using the Windows Management Instrumentation Command-Line tool for host-based analysis and the Bro intrusion-detection software for network-based analysis. Particularly useful techniques we used were learning the historical range of parameters of numeric quantities so as to recognize anomalies, learning the usual addresses of connections to a node, observing Internet addresses (usually rare), observing anomalous network protocols such as unencrypted data transfers, observing unusual scheduled tasks, and comparing key files through registry entries and hash values to find malicious modifications. We tested our methods on actual data from ICSs including publicly-available data, voluntarily-submitted data, and researcher-provided "advanced persistent threat" data. We found instances of interesting behavior in our experiments. Intrusions were generally easy to see because of the repetitive nature of most processing on ICSs, but operators need to be motivated to look.

  15. Adolescent Maturation of Dopamine D1 and D2 Receptor Function and Interactions in Rodents

    PubMed Central

    Dwyer, Jennifer B.; Leslie, Frances M.

    2016-01-01

    Adolescence is a developmental period characterized by heightened vulnerability to illicit drug use and the onset of neuropsychiatric disorders. These clinical phenomena likely share common neurobiological substrates, as mesocorticolimbic dopamine systems actively mature during this period. Whereas prior studies have examined age-dependent changes in dopamine receptor binding, there have been fewer functional analyses. The aim of the present study was therefore to determine whether the functional consequences of D1 and D2-like activation are age-dependent. Adolescent and adult rats were given direct D1 and D2 agonists, alone and in combination. Locomotor and stereotypic behaviors were measured, and brains were collected for analysis of mRNA expression for the immediate early genes (IEGs), cfos and arc. Adolescents showed enhanced D2-like receptor control of locomotor and repetitive behaviors, which transitioned to dominant D1-like mechanisms in adulthood. When low doses of agonists were co-administered, adults showed supra-additive behavioral responses to D1/D2 combinations, whereas adolescents did not, which may suggest age differences in D1/D2 synergy. D1/D2-stimulated IEG expression was particularly prominent in the bed nucleus of the stria terminalis (BNST). Given the BNST’s function as an integrator of corticostriatal, hippocampal, and stress-related circuitry, and the importance of neural network dynamics in producing behavior, an exploratory functional network analysis of regional IEG expression was performed. This data-driven analysis demonstrated similar developmental trajectories as those described in humans and suggested that dopaminergic drugs alter forebrain coordinated gene expression age dependently. D1/D2 recruitment of stress nuclei into functional networks was associated with low behavioral output in adolescents. Network analysis presents a novel tool to assess pharmacological action, and highlights critical developmental changes in functional neural circuitry. Immature D1/D2 interactions in adolescents may underlie their unique responses to drugs of abuse and vulnerability to psychopathology. These data highlight the need for age-specific pharmacotherapy design and clinical application in adolescence. PMID:26784516

  16. Final Report: Computer-aided Human Centric Cyber Situation Awareness

    DTIC Science & Technology

    2016-03-20

    logs, OS audit trails, vulnerability reports, and packet dumps ), weeding out the false positives, grouping the related indicators so that different...short time duration of each visual stimulus in an fMRI study, we have designed “network security analysis cards ” that require the subject to...determine whether alerts in the cards indicate malicious events. Two types of visual displays of alerts (i.e., tabular display and node-link display) are

  17. Karst groundwater vulnerability mapping to the pollution: Case of Dir springs located between EL KSIBA and Ouaoumana (High Atlas, Morocco)

    NASA Astrophysics Data System (ADS)

    Alili, L.; Boukdir, A.; Maslouhi, M. R.; Ikhmerdi, H.

    2018-05-01

    The study area is located in the north of the province of Beni Mellal, it covers the Piedmont of the high Atlas between El Ksiba and Ouaoumana. It is characterized by a poorly developed hydrographic network and the presence of very important karstic forms. These forms condition the rapid infiltration to the karstic springs are the subject of this study. In this work we presented a method of mapping the vulnerability to pollution of Karstic springs located between El Ksiba and Ouaoumana. To do this, we have introduced a vulnerability index called F which takes into account four parameters (EPIK): Development of the Epikarst, importance of the protective cover, infiltration conditions and development of the Karst network. The overlay of the thematic maps of these parameters through a GIS software (ArcGIS) gave us a map of the vulnerability to contamination on the whole hydrogeological basin of the springs.

  18. Grandiose and Vulnerable Narcissists: Who Is at Higher Risk for Social Networking Addiction?

    PubMed

    Casale, Silvia; Fioravanti, Giulia; Rugai, Laura

    2016-08-01

    Scholars have recently taken an interest in the connection between narcissism and Internet use, especially among users who frequent social networking sites (SNSs). Conversely, the association between narcissism and problematic use of SNSs (i.e., unregulated use that leads to negative outcomes) has been scarcely investigated. This study addresses this gap by comparing the mean levels of problematic use of SNSs among grandiose narcissists, vulnerable narcissists, and non-narcissists. A sample of 535 students completed the 16-item Narcissistic Personality Inventory, the Hypersensitive Narcissism Scale, and the Generalized Problematic Internet Use Scale-2 (GPIUS2). Vulnerable narcissists reported (a) significant higher levels on all GPIUS2 subscales and total scores than non-narcissists and (b) a stronger preference for online social interactions and higher overall levels of problematic use of SNSs than grandiose narcissists. Conversely, no significant differences were found between grandiose narcissists and non-narcissists. This study suggests that vulnerable narcissism may contribute more to problematic use of SNSs than grandiose narcissism.

  19. Combining demographic and genetic factors to assess population vulnerability in stream species

    USGS Publications Warehouse

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss of genetic diversity and reduced numbers in certain vulnerable populations. This demogenetic simulation framework, which is illustrated in a web-based interactive mapping prototype, should be useful for evaluating population vulnerability in a wide variety of dendritic and fragmented riverscapes, helping to guide conservation and management efforts for freshwater species.

  20. How mutation alters the evolutionary dynamics of cooperation on networks

    NASA Astrophysics Data System (ADS)

    Ichinose, Genki; Satotani, Yoshiki; Sayama, Hiroki

    2018-05-01

    Cooperation is ubiquitous at every level of living organisms. It is known that spatial (network) structure is a viable mechanism for cooperation to evolve. A recently proposed numerical metric, average gradient of selection (AGoS), a useful tool for interpreting and visualizing evolutionary dynamics on networks, allows simulation results to be visualized on a one-dimensional phase space. However, stochastic mutation of strategies was not considered in the analysis of AGoS. Here we extend AGoS so that it can analyze the evolution of cooperation where mutation may alter strategies of individuals on networks. We show that our extended AGoS correctly visualizes the final states of cooperation with mutation in the individual-based simulations. Our analyses revealed that mutation always has a negative effect on the evolution of cooperation regardless of the payoff functions, fraction of cooperators, and network structures. Moreover, we found that scale-free networks are the most vulnerable to mutation and thus the dynamics of cooperation are altered from bistability to coexistence on those networks, undergoing an imperfect pitchfork bifurcation.

  1. An Assessment of Vulnerability and Trade-offs of Dairy Farmers of India to Climate Variability and Change

    NASA Astrophysics Data System (ADS)

    Radhakrishnan, Aparna; Gupta, Jancy; Ravindran, Dileepkumar

    2017-04-01

    The study aims at assessing the vulnerability and tradeoffs of dairy based livelihoods to Climate Variability and Change (CVC) in the Western Ghats ecosystem, India. For this purpose; data were aggregated to an overall Livelihood Vulnerability Index (LVI) to CVC underlying the principles of IPCC, using 40 indicators under 7 LVI components. Fussel framework was used for the nomenclature of vulnerable situation and trade-off between vulnerability components and milk production was calculated. Data were collected through participatory rural appraisal and personal interviews from 360 randomly selected dairy farmers of nine blocks from three states of Western Ghat region, complemented by thirty years of gridded weather data and livestock data. The LVI score of dairy based livelihoods of six taluks were negative. The data were normalized and then combined into three indices of sensitivity, exposure and adaptive capacity, which were then averaged with weights given using principal component analysis, to obtain the overall vulnerability index. Mann Whitney U test was used to find the significant difference between the taluks in terms of LVI and cumulative square root frequency method was used to categorise the farmers. Even though the taluks are geographically closer, there is significant difference in the LVI values of the regions. Results indicated that the Lanja taluks of Maharashtra is the most vulnerable having an overall LVI value -4.17 with 48% farmers falling in highly vulnerable category. Panel regression analysis reveals that there is significant synergy between average milk production and livestock, social network component and trade-off between natural disasters climate variability component of LVI. Policies for incentivizing the 'climate risk adaptation' costs for small and marginal farmers and livelihood infrastructure for mitigating risks and promoting grass root level innovations are necessary to sustain dairy farming of the region. Thus the research will provide an important basis for policy makers to develop appropriate adaptation strategies for alarming situation and decision making for farmers to minimize the risk of dairy sector to climate variability.

  2. Index based regional vulnerability assessment to cyclones hazards of coastal area of Bangladesh

    NASA Astrophysics Data System (ADS)

    Mohammad, Q. A.; Kervyn, M.; Khan, A. U.

    2016-12-01

    Cyclone, storm surge, coastal flooding, salinity intrusion, tornado, nor'wester, and thunderstorms are the listed natural hazards in the coastal areas of Bangladesh. Bangladesh was hit by devastating cyclones in 1970, 1991, 2007, 2009, and 2016. Intensity and frequency of natural hazards in the coastal area are likely to increase in future due to climate change. Risk assessment is one of the most important steps of disaster risk reduction. As a climate change victim nation, Bangladesh claims compensation from green climate fund. It also created its own climate funds. It is therefore very important to assess vulnerability of the coast of Bangladesh to natural hazards for efficient allocation of financial investment to support the national risk reduction. This study aims at identifying the spatial variations in factors contributing to vulnerability of the coastal inhabitants of Bangladesh to natural hazards. An exploratory factor analysis method has been used to assess the vulnerability at each local administrative unit. The 141 initially selected 141 socio-economic indicators were reduced to 41 by converting some of them to meaningful widely accepted indicators and removing highly correlated indicators. Principle component analysis further reduced 41 indicators to 13 dimensions which explained 79% of total variation. PCA dimensions show three types of characteristics of the people that may lead people towards vulnerability. They are (a) demographic, education and job opportunities, (b) access to basic needs and facilities, and (c) special needs people. Vulnerability maps of the study area has been prepared by weighted overlay of the dimensions. Study revealed that 29 and 8 percent of total coastal area are very high and high vulnerable to natural hazards respectively. These are distributed along sea boundary and major rivers. Comparison of this spatial distribution with the capacities to face disaster show that highly vulnerable areas are well covered by cyclone shelters but are not the zone with the most resistant building and the most dense road networks. The findings will be helpful for policy makers to initiate, plan and implement short, medium and long term DRR strategies.

  3. Dengue research networks: building evidence for policy and planning in Brazil.

    PubMed

    de Paula Fonseca E Fonseca, Bruna; Zicker, Fabio

    2016-11-08

    The analysis of scientific networks has been applied in health research to map and measure relationships between researchers and institutions, describing collaboration structures, individual roles, and research outputs, and helping the identification of knowledge gaps and cooperation opportunities. Driven by dengue continued expansion in Brazil, we explore the contribution, dynamics and consolidation of dengue scientific networks that could ultimately inform the prioritisation of research, financial investments and health policy. Social network analysis (SNA) was used to produce a 20-year (1995-2014) retrospective longitudinal evaluation of dengue research networks within Brazil and with its partners abroad, with special interest in describing institutional collaboration and their research outputs. The analysis of institutional co-authorship showed a significant expansion of collaboration over the years, increased international involvement, and ensured a shift from public health research toward vector control and basic biomedical research, probably as a reflection of the expansion of transmission, high burden and increasing research funds from the Brazilian government. The analysis identified leading national organisations that maintained the research network connectivity, facilitated knowledge exchange and reduced network vulnerability. SNA proved to be a valuable tool that, along with other indicators, can strengthen a knowledge platform to inform future policy, planning and funding decisions. The paper provides relevant information to policy and planning for dengue research as it reveals: (1) the effectiveness of the research network in knowledge generation, sharing and diffusion; (2) the near-absence of collaboration with the private sector; and (3) the key central organisations that can support strategic decisions on investments, development and implementation of innovations. In addition, the increase in research activities and collaboration has not yet significantly affected dengue transmission, suggesting a limited translation of research efforts into public health solutions.

  4. Examining Food Risk in the Large using a Complex, Networked System-of-sytems Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ambrosiano, John; Newkirk, Ryan; Mc Donald, Mark P

    2010-12-03

    The food production infrastructure is a highly complex system of systems. Characterizing the risks of intentional contamination in multi-ingredient manufactured foods is extremely challenging because the risks depend on the vulnerabilities of food processing facilities and on the intricacies of the supply-distribution networks that link them. A pure engineering approach to modeling the system is impractical because of the overall system complexity and paucity of data. A methodology is needed to assess food contamination risk 'in the large', based on current, high-level information about manufacturing facilities, corrunodities and markets, that will indicate which food categories are most at risk ofmore » intentional contamination and warrant deeper analysis. The approach begins by decomposing the system for producing a multi-ingredient food into instances of two subsystem archetypes: (1) the relevant manufacturing and processing facilities, and (2) the networked corrunodity flows that link them to each other and consumers. Ingredient manufacturing subsystems are modeled as generic systems dynamics models with distributions of key parameters that span the configurations of real facilities. Networks representing the distribution systems are synthesized from general information about food corrunodities. This is done in a series of steps. First, probability networks representing the aggregated flows of food from manufacturers to wholesalers, retailers, other manufacturers, and direct consumers are inferred from high-level approximate information. This is followed by disaggregation of the general flows into flows connecting 'large' and 'small' categories of manufacturers, wholesalers, retailers, and consumers. Optimization methods are then used to determine the most likely network flows consistent with given data. Vulnerability can be assessed for a potential contamination point using a modified CARVER + Shock model. Once the facility and corrunodity flow models are instantiated, a risk consequence analysis can be performed by injecting contaminant at chosen points in the system and propagating the event through the overarching system to arrive at morbidity and mortality figures. A generic chocolate snack cake model, consisting of fluid milk, liquid eggs, and cocoa, is described as an intended proof of concept for multi-ingredient food systems. We aim for an eventual tool that can be used directly by policy makers and planners.« less

  5. Rethinking vulnerability analysis and governance with emphasis on a participatory approach.

    PubMed

    Rossignol, Nicolas; Delvenne, Pierre; Turcanu, Catrinel

    2015-01-01

    This article draws on vulnerability analysis as it emerged as a complement to classical risk analysis, and it aims at exploring its ability for nurturing risk and vulnerability governance actions. An analysis of the literature on vulnerability analysis allows us to formulate a three-fold critique: first, vulnerability analysis has been treated separately in the natural and the technological hazards fields. This separation prevents vulnerability from unleashing the full range of its potential, as it constrains appraisals into artificial categories and thus already closes down the outcomes of the analysis. Second, vulnerability analysis focused on assessment tools that are mainly quantitative, whereas qualitative appraisal is a key to assessing vulnerability in a comprehensive way and to informing policy making. Third, a systematic literature review of case studies reporting on participatory approaches to vulnerability analysis allows us to argue that participation has been important to address the above, but it remains too closed down in its approach and would benefit from embracing a more open, encompassing perspective. Therefore, we suggest rethinking vulnerability analysis as one part of a dynamic process between opening-up and closing-down strategies, in order to support a vulnerability governance framework. © 2014 Society for Risk Analysis.

  6. Cultural knowledge and local vulnerability in African American communities

    NASA Astrophysics Data System (ADS)

    Miller Hesed, Christine D.; Paolisso, Michael

    2015-07-01

    Policymakers need to know what factors are most important in determining local vulnerability to facilitate effective adaptation to climate change. Quantitative vulnerability indices are helpful in this endeavour but are limited in their ability to capture subtle yet important aspects of vulnerability such as social networks, knowledge and access to resources. Working with three African American communities on Maryland’s Eastern Shore, we systematically elicit local cultural knowledge on climate change and connect it with a scientific vulnerability framework. The results of this study show that: a given social-ecological factor can substantially differ in the way in which it affects local vulnerability, even among communities with similar demographics and climate-related risks; and social and political isolation inhibits access to sources of adaptive capacity, thereby exacerbating local vulnerability. These results show that employing methods for analysing cultural knowledge can yield new insights to complement those generated by quantitative vulnerability indices.

  7. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  8. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  9. Developing a Composite Aquifer Vulnerability Assessment Model Combining DRASTIC with Agricultural Land Use in Choushui River Alluvial Fan, Central Taiwan

    NASA Astrophysics Data System (ADS)

    Chen, Shih-Kai; Hsieh, Chih-Heng; Tsai, Cheng-Bin

    2017-04-01

    Aquifer vulnerability assessment is considered to be an effective tool in controlling potential pollution which is critical for groundwater management. The Choushui River alluvial fan, located in central Taiwan, is an agricultural area with complex crop patterns and various irrigation schemes, which increased the difficulties in groundwater resource management. The aim of this study is to propose an integrated methodology to assess shallow groundwater vulnerability by including land-use impact on groundwater potential pollution. The original groundwater vulnerability methodology, DRASTIC, was modified by adding a land-use parameter in order to assess groundwater vulnerability under intense agricultural activities. To examine the prediction capacity of pollution for the modified DRASTIC model, various risk categories of contamination potentials were compared with observed nitrate-N obtained from groundwater monitoring network. It was found that for the original DRASTIC vulnerability map, some areas with low nitrate-N concentrations are covered within the high vulnerability areas, especially in the northern part of mid-fan areas, where rice paddy is the main crop and planted for two crop seasons per year. The low nitrate-N contamination potential of rice paddies may be resulted from the denitrification in the reduced root zone. By reducing the rating for rice paddies, the modified model was proved to be capable of increasing the precise of prediction in study area. The results can provide a basis for groundwater monitoring network design and effective preserve measures formulation in the mixed agricultural area. Keyword:Aquifer Vulnerability, Groundwater, DRASTIC, Nitrate-N

  10. A study on eco-environmental vulnerability of mining cities: a case study of Panzhihua city of Sichuan province in China

    NASA Astrophysics Data System (ADS)

    Shao, Huaiyong; Xian, Wei; Yang, Wunian

    2009-07-01

    The large-scale and super-strength development of mineral resources in mining cities in long term has made great contributions to China's economic construction and development, but it has caused serious damage to the ecological environment even ecological imbalance at the same time because the neglect of the environmental impact even to the expense of the environment to some extent. In this study, according to the characteristics of mining cities, the scientific and practical eco-environmental vulnerability evaluation index system of mining cities had been established. Taking Panzhihua city of Sichuan province as an example, using remote sensing and GIS technology, applying various types of remote sensing image (TM, SPOT5, IKONOS) and Statistical data, the ecological environment evaluation data of mining cities was extracted effectively. For the non-linear relationship between the evaluation indexes and the degree of eco-environmental vulnerability in mining cities, this study innovative took the evaluation of eco-environmental vulnerability of the study area by using artificial neural network whose training used SCE-UA algorithm that well overcome the slow learning and difficult convergence of traditional neural network algorithm. The results of ecoenvironmental vulnerability evaluation of the study area were objective, reasonable and the credibility was high. The results showed that the area distribution of five eco-environmental vulnerability grade types was basically normal, and the overall ecological environment situation of Panzhihua city was in the middle level, the degree of eco-environmental vulnerability in the south was higher than the north, and mining activities were dominant factors to cause ecoenvironmental damage and eco-environmental Vulnerability. In this study, a comprehensive theory and technology system of regional eco-environmental vulnerability evaluation which included the establishment of eco-environmental vulnerability evaluation index system, processing of evaluation data and establishing of evaluation model. New ideas and methods had provided for eco-environmental vulnerability of mining cities.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  12. Progress towards design elements for a Great Lakes-wide aquatic invasive species early detection network

    EPA Science Inventory

    Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...

  13. Connectivity of Multi-Channel Fluvial Systems: A Comparison of Topology Metrics for Braided Rivers and Delta Networks

    NASA Astrophysics Data System (ADS)

    Tejedor, A.; Marra, W. A.; Addink, E. A.; Foufoula-Georgiou, E.; Kleinhans, M. G.

    2016-12-01

    Advancing quantitative understanding of the structure and dynamics of complex networks has transformed research in many fields as diverse as protein interactions in a cell to page connectivity in the World Wide Web and relationships in human societies. However, Geosciences have not benefited much from this new conceptual framework, although connectivity is at the center of many processes in hydro-geomorphology. One of the first efforts in this direction was the seminal work of Smart and Moruzzi (1971), proposing the use of graph theory for studying the intricate structure of delta channel networks. In recent years, this preliminary work has precipitated in a body of research that examines the connectivity of multiple-channel fluvial systems, such as delta networks and braided rivers. In this work, we compare two approaches recently introduced in the literature: (1) Marra et al. (2014) utilized network centrality measures to identify important channels in a braided section of the Jamuna River, and used the changes of bifurcations within the network over time to explain the overall river evolution; and (2) Tejedor et al. (2015a,b) developed a set of metrics to characterize the complexity of deltaic channel networks, as well as defined a vulnerability index that quantifies the relative change of sediment and water delivery to the shoreline outlets in response to upstream perturbations. Here we present a comparative analysis of metrics of centrality and vulnerability applied to both braided and deltaic channel networks to depict critical channels in those systems, i.e., channels where a change would contribute more substantially to overall system changes, and to understand what attributes of interest in a channel network are most succinctly depicted in what metrics. Marra, W. A., Kleinhans, M. G., & Addink, E. A. (2014). Earth Surface Processes and Landforms, doi:10.1002/esp.3482Smart, J. S., and V. L. Moruzzi (1971), Quantitative properties of delta channel networks, Tech. Rep. 3, 27 pp., IBM Thomas J. Watson Res. Cent., Yorktown, NYTejedor, A., Longjas, A., Zaliapin, I., & Foufoula-Georgiou, E. (2015a/b). Water Resources Research, doi:10.1002/2014WR016259 & doi:10.1002/2014WR016604

  14. UGV: security analysis of subsystem control network

    NASA Astrophysics Data System (ADS)

    Abbott-McCune, Sam; Kobezak, Philip; Tront, Joseph; Marchany, Randy; Wicks, Al

    2013-05-01

    Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the fault tolerance and the message structure allowing high priority messages to reach the desired node in a real time environment. UGVs are being researched and produced at an accelerated rate to preform arduous, repetitive, and dangerous missions that are associated with a military action in a protracted conflict. The technology and applications of the research will inevitably be turned into dual-use platforms to aid civil agencies in the performance of their various operations. Our motivation is security of the holistic system; however as subsystems are outsourced in the design, the overall security of the system may be diminished. We will focus on the CAN bus topology and the vulnerabilities introduced in UGVs and recognizable security vulnerabilities that are inherent in the communications architecture. We will show how data can be extracted from an add-on CAN bus that can be customized to monitor subsystems. The information can be altered or spoofed to force the vehicle to exhibit unwanted actions or render the UGV unusable for the designed mission. The military relies heavily on technology to maintain information dominance, and the security of the information introduced onto the network by UGVs must be safeguarded from vulnerabilities that can be exploited.

  15. A Systems Approach to Agricultural Biosecurity.

    PubMed

    Anand, Manish

    This article highlights the importance of systems approaches in addressing agricultural biosecurity threats. On the basis of documentary analysis and stakeholder interaction, a brief survey of agricultural biosecurity threats and vulnerabilities from global and Indian perspectives is provided, followed by an exploration of technological and institutional capabilities. Finally, a perspective on the agricultural disease diagnostic networks is provided, drawing instances from global developments. Technical barriers to agroterrorism are lower than those to human-targeted bioterrorism, and the sector is unique as even a very small disease outbreak could prompt international export restrictions. Key vulnerabilities in the agriculture sector stem from, among others, the structure of agricultural production; insufficient monitoring, surveillance, and controls systems at the borders and in the food chain; inefficient systems for reporting unusual occurrences and outbreaks of disease; and lack of sufficiently trained human resources capable of recognizing or treating transboundary pathogens and diseases. An assessment of technology and institutions pertaining to crop and animal protection management suggests certain gaps. Investment in developing new technologies for civilian application in agriculture, as well as for legitimate actions pertaining to defense, detection, protection, and prophylaxis, and in upgrading laboratory facilities can increase the agricultural sector's level of preparedness for outbreaks. To address potential threats and vulnerabilities of agroterrorism effectively requires the development of a comprehensive strategy and a combined, interagency approach, ideally on an international level. It is proposed that a systems-oriented approach for developing knowledge and innovation networks and strengthening skills and capacities would enable a more resilient agricultural biosecurity system.

  16. A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mousavian, Seyedamirabbas; Valenzuela, Jorge; Wang, Jianhui

    The power grid is becoming more dependent on information and communication technologies. Complex networks of advanced sensors such as phasor measurement units (PMUs) are used to collect real time data to improve the observability of the power system. Recent studies have shown that the power grid has significant cyber vulnerabilities which could increase when PMUs are used extensively. Therefore, recognizing and responding to vulnerabilities are critical to the security of the power grid. This paper proposes a risk mitigation model for optimal response to cyber-attacks to PMU networks. We model the optimal response action as a mixed integer linear programmingmore » (MILP) problem to prevent propagation of the cyber-attacks and maintain the observability of the power system.« less

  17. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks

    PubMed Central

    Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua

    2014-01-01

    Simple Summary The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to members of the community who are already considered vulnerable? This article addresses this important question by synthesizing information about what makes seven particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. It concludes that animal attachment could provide a novel conduit for accessing, communicating with and motivating vulnerable people to engage in resilience building behaviors that promote survival and facilitate recovery. Abstract Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together. PMID:26480038

  18. Vulnerability of Rhode Island Salt Marshes to Sea Level Rise and Poor Water Quality

    EPA Science Inventory

    Across the northeastern Unites States, salt marshes are losing ground. Edges are eroding, tidal channel networks are expanding, and new ponds are forming and expanding within salt marshes. This leaves shorelines - and in some cases houses - more vulnerable to nor'easters and tr...

  19. Social Capital and Vulnerability from the Family, Neighborhood, School, and Community Perspectives

    ERIC Educational Resources Information Center

    Williams, Bonita; Le Menestrel, Suzanne M.

    2013-01-01

    This article reviews research and offers program examples for developing social capital in youth with a range of vulnerabilities: emotional, physical, social, and developmental. Protective factors provided by developing social capital at the individual level include access to support networks, transition to employment, and community connectedness.…

  20. Is Your Network Safe?

    ERIC Educational Resources Information Center

    Williams, Cheryl S.; Krueger, Keith R.

    2005-01-01

    Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…

  1. Systematic review of social network analysis in adolescent cigarette smoking behavior.

    PubMed

    Seo, Dong-Chul; Huang, Yan

    2012-01-01

    Social networks are important in adolescent smoking behavior. Previous research indicates that peer context is a major causal factor of adolescent smoking behavior. To date, however, little is known about the influence of peer group structure on adolescent smoking behavior. Studies that examined adolescent social networks with regard to their cigarette smoking behavior were identified through online and manual literature searches. Ten social network analysis studies involving a total of 28,263 adolescents were included in the final review. Of the 10 reviewed studies, 6 identify clique members, liaisons, and isolates as contributing factors to adolescent cigarette smoking. Significantly higher rates of smoking are noted among isolates than clique members or liaisons in terms of peer network structure. Eight of the reviewed studies indicate that peer selection or influence precedes adolescents' smoking behavior and intent to smoke. Such peer selection or influence accounts for a large portion of similarities among smoking adolescents. Adolescents who are identified as isolates are more likely to smoke and engage in risk-taking behaviors than others in the peer network structure. Given that the vast majority of current adult smokers started their smoking habits during adolescence, adolescent smoking prevention efforts will likely benefit from incorporating social network analytic approaches and focusing the efforts on isolates and other vulnerable adolescents from a peer selection and influence perspective. © 2011, American School Health Association.

  2. Integration of social dimension in an index oriented methodology for consequence analysis of natural hazards: application to the Upper Guil Catchment (Southern French Alps)

    NASA Astrophysics Data System (ADS)

    Carlier, Benoit; Puissant, Anne; Dujarric, Constance

    2017-04-01

    Vulnerability assessment together with hazard exposure is generally accepted as the two main steps of risk analysis. If quantitative methods to estimate hazard exposure are now well-defined, it is not the case regarding vulnerability assessment. Vulnerability is a complex concept involving a variety of disciplines from physical and socio-economic sciences (i.e. engineering, economics, social and health sciences etc.). Currently, two opposite trends exist: the 'physical' approach in which vulnerability is analysed as potential impacts (i.e. structural and functional) on the elements at risk (building, network, land cover); and the 'social' approach in which vulnerability is a combination of socio-economic variables determining people's ability to anticipate before a catastrophic event, to react during it, and to recover after it. For a complete analysis of vulnerability it is essential to combine these two approaches but in reality few works exists. The objective of this research is to improve the Potential Damage Index (PDI), detailed in Puissant el al. (2013), originally developed to assess physical injury, structural and functional consequences of landslide hazard, by including socio-economic characteristics of population information. Data from the French Census data (INSEE, 2012) and a survey on risk perception (100 questionnaires obtained between 2014 and 2015/16) were used to propose an overall index taking into account the three main phases of risk management: preparedness, crisis management and recovery. This new index called Global Potential Damage Index (GPDI) is applied on the Upper Guil Catchment to assess potential torrential floods hazard in the context of the French funded project SAMCO (Society Adaptation for coping with Mountain risks in a global change Context). Results of the PDI are compared with the GPDI and show significant differences. GPDI scores mapping are lower than PDI scores indicating that resilient population may qualify results obtained for physical consequences. In GPDI the social and institutional component is expressed by a unique value applied for the overall stakes of a same community. Consequently, socio-economics differences between Upper Guil catchments communities are highlighted and make results easily understandable for local manager.

  3. Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.

    PubMed

    Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis

    2016-08-01

    Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.

  4. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    PubMed Central

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  5. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    PubMed

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.

  6. Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation

    DTIC Science & Technology

    2007-03-01

    results (Ingols 2005). 2.4.3 Skybox - Skybox view Skybox View is a commercially available tool developed by Skybox Security that can automatically...generate attack graphs through the use of host-based agents, management interfaces, and an analysis server located on the target network ( Skybox 2006... Skybox , an examination of recent patents submitted by Skybox identified the algorithmic complexity of the product as n4, where n represents the number

  7. Is It Time for a US Cyber Force?

    DTIC Science & Technology

    2015-02-17

    network of information technology (IT) and resident data, including the Internet , telecommunications networks, computer systems, and embedded processors...and controllers.13 JP 3-12 further goes on to explain cyberspace in terms of three layers: physical network, logical network, and cyber- persona .14...zero day) vulnerabilities against Microsoft operating system code using trusted hardware vendor certificates to cloak their presence. Though not

  8. Evaluation of a Social Network Intervention for People with Mild to Borderline Intellectual Disabilities.

    PubMed

    van Asselt-Goverts, A E; Embregts, P J C M; Hendriks, A H C

    2018-03-01

    Little is known about the effectiveness of interventions aimed at enhancing the social networks of people with intellectual disabilities. This study explores the results of such an intervention. How did the clients with mild to borderline intellectual disabilities and their support workers evaluate the intervention? What did they learn from it? Were there any changes in network characteristics, satisfaction and wishes in relation to networks, participation, loneliness, self-determination or self-esteem? The evaluation of the intervention was explored from several perspectives (i.e. five clients, their six support workers and three trainers), using mixed methods (i.e. interviews and questionnaires). The intervention was positively evaluated by both clients and support workers. Moreover, the analysis revealed the vulnerability of clients and their networks but also the benefits experienced from the intervention, such as decreased loneliness, enhanced social networks, increased awareness, competence, autonomy and increased participation. The indicative level of evidence for the effectiveness of this intervention justifies a larger series of case studies or a larger control trial study. © 2016 John Wiley & Sons Ltd.

  9. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  10. Neurodevelopmental alterations of large-scale structural networks in children with new-onset epilepsy

    PubMed Central

    Bonilha, Leonardo; Tabesh, Ali; Dabbs, Kevin; Hsu, David A.; Stafstrom, Carl E.; Hermann, Bruce P.; Lin, Jack J.

    2014-01-01

    Recent neuroimaging and behavioral studies have revealed that children with new onset epilepsy already exhibit brain structural abnormalities and cognitive impairment. How the organization of large-scale brain structural networks is altered near the time of seizure onset and whether network changes are related to cognitive performances remain unclear. Recent studies also suggest that regional brain volume covariance reflects synchronized brain developmental changes. Here, we test the hypothesis that epilepsy during early-life is associated with abnormalities in brain network organization and cognition. We used graph theory to study structural brain networks based on regional volume covariance in 39 children with new-onset seizures and 28 healthy controls. Children with new-onset epilepsy showed a suboptimal topological structural organization with enhanced network segregation and reduced global integration compared to controls. At the regional level, structural reorganization was evident with redistributed nodes from the posterior to more anterior head regions. The epileptic brain network was more vulnerable to targeted but not random attacks. Finally, a subgroup of children with epilepsy, namely those with lower IQ and poorer executive function, had a reduced balance between network segregation and integration. Taken together, the findings suggest that the neurodevelopmental impact of new onset childhood epilepsies alters large-scale brain networks, resulting in greater vulnerability to network failure and cognitive impairment. PMID:24453089

  11. Functional brain networks in Alzheimer's disease: EEG analysis based on limited penetrable visibility graph and phase space method

    NASA Astrophysics Data System (ADS)

    Wang, Jiang; Yang, Chen; Wang, Ruofan; Yu, Haitao; Cao, Yibin; Liu, Jing

    2016-10-01

    In this paper, EEG series are applied to construct functional connections with the correlation between different regions in order to investigate the nonlinear characteristic and the cognitive function of the brain with Alzheimer's disease (AD). First, limited penetrable visibility graph (LPVG) and phase space method map single EEG series into networks, and investigate the underlying chaotic system dynamics of AD brain. Topological properties of the networks are extracted, such as average path length and clustering coefficient. It is found that the network topology of AD in several local brain regions are different from that of the control group with no statistically significant difference existing all over the brain. Furthermore, in order to detect the abnormality of AD brain as a whole, functional connections among different brain regions are reconstructed based on similarity of clustering coefficient sequence (CCSS) of EEG series in the four frequency bands (delta, theta, alpha, and beta), which exhibit obvious small-world properties. Graph analysis demonstrates that for both methodologies, the functional connections between regions of AD brain decrease, particularly in the alpha frequency band. AD causes the graph index complexity of the functional network decreased, the small-world properties weakened, and the vulnerability increased. The obtained results show that the brain functional network constructed by LPVG and phase space method might be more effective to distinguish AD from the normal control than the analysis of single series, which is helpful for revealing the underlying pathological mechanism of the disease.

  12. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    PubMed

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  13. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A

    PubMed Central

    King, Cason R.; Zhang, Ali; Tessier, Tanner M.; Gameiro, Steven F.

    2018-01-01

    ABSTRACT As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected “hub” proteins to “hack” the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. PMID:29717008

  14. Ecological networks are more sensitive to plant than to animal extinction under climate change

    PubMed Central

    Schleuning, Matthias; Fründ, Jochen; Schweiger, Oliver; Welk, Erik; Albrecht, Jörg; Albrecht, Matthias; Beil, Marion; Benadi, Gita; Blüthgen, Nico; Bruelheide, Helge; Böhning-Gaese, Katrin; Dehling, D. Matthias; Dormann, Carsten F.; Exeler, Nina; Farwig, Nina; Harpke, Alexander; Hickler, Thomas; Kratochwil, Anselm; Kuhlmann, Michael; Kühn, Ingolf; Michez, Denis; Mudri-Stojnić, Sonja; Plein, Michaela; Rasmont, Pierre; Schwabe, Angelika; Settele, Josef; Vujić, Ante; Weiner, Christiane N.; Wiemers, Martin; Hof, Christian

    2016-01-01

    Impacts of climate change on individual species are increasingly well documented, but we lack understanding of how these effects propagate through ecological communities. Here we combine species distribution models with ecological network analyses to test potential impacts of climate change on >700 plant and animal species in pollination and seed-dispersal networks from central Europe. We discover that animal species that interact with a low diversity of plant species have narrow climatic niches and are most vulnerable to climate change. In contrast, biotic specialization of plants is not related to climatic niche breadth and vulnerability. A simulation model incorporating different scenarios of species coextinction and capacities for partner switches shows that projected plant extinctions under climate change are more likely to trigger animal coextinctions than vice versa. This result demonstrates that impacts of climate change on biodiversity can be amplified via extinction cascades from plants to animals in ecological networks. PMID:28008919

  15. Ecological networks are more sensitive to plant than to animal extinction under climate change.

    PubMed

    Schleuning, Matthias; Fründ, Jochen; Schweiger, Oliver; Welk, Erik; Albrecht, Jörg; Albrecht, Matthias; Beil, Marion; Benadi, Gita; Blüthgen, Nico; Bruelheide, Helge; Böhning-Gaese, Katrin; Dehling, D Matthias; Dormann, Carsten F; Exeler, Nina; Farwig, Nina; Harpke, Alexander; Hickler, Thomas; Kratochwil, Anselm; Kuhlmann, Michael; Kühn, Ingolf; Michez, Denis; Mudri-Stojnić, Sonja; Plein, Michaela; Rasmont, Pierre; Schwabe, Angelika; Settele, Josef; Vujić, Ante; Weiner, Christiane N; Wiemers, Martin; Hof, Christian

    2016-12-23

    Impacts of climate change on individual species are increasingly well documented, but we lack understanding of how these effects propagate through ecological communities. Here we combine species distribution models with ecological network analyses to test potential impacts of climate change on >700 plant and animal species in pollination and seed-dispersal networks from central Europe. We discover that animal species that interact with a low diversity of plant species have narrow climatic niches and are most vulnerable to climate change. In contrast, biotic specialization of plants is not related to climatic niche breadth and vulnerability. A simulation model incorporating different scenarios of species coextinction and capacities for partner switches shows that projected plant extinctions under climate change are more likely to trigger animal coextinctions than vice versa. This result demonstrates that impacts of climate change on biodiversity can be amplified via extinction cascades from plants to animals in ecological networks.

  16. Human Dopamine Receptors Interaction Network (DRIN): a systems biology perspective on topology, stability and functionality of the network.

    PubMed

    Podder, Avijit; Jatana, Nidhi; Latha, N

    2014-09-21

    Dopamine receptors (DR) are one of the major neurotransmitter receptors present in human brain. Malfunctioning of these receptors is well established to trigger many neurological and psychiatric disorders. Taking into consideration that proteins function collectively in a network for most of the biological processes, the present study is aimed to depict the interactions between all dopamine receptors following a systems biology approach. To capture comprehensive interactions of candidate proteins associated with human dopamine receptors, we performed a protein-protein interaction network (PPIN) analysis of all five receptors and their protein partners by mapping them into human interactome and constructed a human Dopamine Receptors Interaction Network (DRIN). We explored the topology of dopamine receptors as molecular network, revealing their characteristics and the role of central network elements. More to the point, a sub-network analysis was done to determine major functional clusters in human DRIN that govern key neurological pathways. Besides, interacting proteins in a pathway were characterized and prioritized based on their affinity for utmost drug molecules. The vulnerability of different networks to the dysfunction of diverse combination of components was estimated under random and direct attack scenarios. To the best of our knowledge, the current study is unique to put all five dopamine receptors together in a common interaction network and to understand the functionality of interacting proteins collectively. Our study pinpointed distinctive topological and functional properties of human dopamine receptors that have helped in identifying potential therapeutic drug targets in the dopamine interaction network. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Towards a proper assignment of systemic risk: the combined roles of network topology and shock characteristics.

    PubMed

    Loepfe, Lasse; Cabrales, Antonio; Sánchez, Angel

    2013-01-01

    The 2007-2008 financial crisis solidified the consensus among policymakers that a macro-prudential approach to regulation and supervision should be adopted. The currently preferred policy option is the regulation of capital requirements, with the main focus on combating procyclicality and on identifying the banks that have a high systemic importance, those that are "too big to fail". Here we argue that the concept of systemic risk should include the analysis of the system as a whole and we explore systematically the most important properties for policy purposes of networks topology on resistance to shocks. In a thorough study going from analytical models to empirical data, we show two sharp transitions from safe to risky regimes: 1) diversification becomes harmful with just a small fraction (~2%) of the shocks sampled from a fat tailed shock distributions and 2) when large shocks are present a critical link density exists where an effective giant cluster forms and most firms become vulnerable. This threshold depends on the network topology, especially on modularity. Firm size heterogeneity has important but diverse effects that are heavily dependent on shock characteristics. Similarly, degree heterogeneity increases vulnerability only when shocks are directed at the most connected firms. Furthermore, by studying the structure of the core of the transnational corporation network from real data, we show that its stability could be clearly increased by removing some of the links with highest centrality betweenness. Our results provide a novel insight and arguments for policy makers to focus surveillance on the connections between firms, in addition to capital requirements directed at the nodes.

  18. [The mental health promotion of children and teenagers in vulnerability and social violence: the challenges for an intersectoral network].

    PubMed

    Passos, Izabel Christina Friche; Vieira, Kelly; Moreira, Laura; Rodrigues, Flávia; Amorim, Margarete; Santos, Cláudia; Abreu, Ana; Gomes, Lucas; Mendes, Luciana; Lima, Isabella; Moura, Francisco; França, Cassandra; Ferraz, Cláudia

    This paper presents and discusses the results of an intervention research conducted in Ouro Preto, Brazil from August 2014 to March 2016. The main objective was to contribute to the development of an intersectoral and interdisciplinary network to face psychosocial vulnerabilities of children and teenagers, especially related to sexual violence and drug use. To achieve this, we identified the difficulties faced by the Sistema de Garantia de Direitos Humanos da Criança e do Adolescente (SGDHCA) implemented by the municipality which take care of this population. We also identified protective and promotion factors accomplished to empower them. The methodology used combines Deleuze and Guattari Cartography, Institutional Analysis and the Cross Training. This latter methodology was developed by a group of researchers of Douglas Institute, in Montreal, which we met through scientific co-operation with our laboratory. On account of the practical-theoric and co-participative activities with the professional network of Ouro Preto, we produced a detailed diagnosis of the SGDHCA and a document proposing short, medium and long-term strategies. As final result, we intend to help the local collective-the Forum Intersetorial da Infância e Juventude-to develop a work plan from the proposed actions. In this paper we will concentrate the potential of the methodology used by presenting outcome from two important moments of the research: the discussions of successful and unsuccessful cases that elucidate the network operation and the potential and difficulties arising from the Rotation Positional, important technical of the Cross Training.

  19. Securing Information with Complex Optical Encryption Networks

    DTIC Science & Technology

    2015-08-11

    Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military

  20. The Effects of Observation Errors on the Attack Vulnerability of Complex Networks

    DTIC Science & Technology

    2012-11-01

    more detail, to construct a true network we select a topology (erdos- renyi (Erdos & Renyi , 1959), scale-free (Barabási & Albert, 1999), small world...Efficiency of Scale-Free Networks: Error and Attack Tolerance. Physica A, Volume 320, pp. 622-642. 6. Erdos, P. & Renyi , A., 1959. On Random Graphs, I

  1. Method and Apparatus for Reducing the Vulnerability of Latches to Single Event Upsets

    NASA Technical Reports Server (NTRS)

    Shuler, Robert L., Jr. (Inventor)

    2002-01-01

    A delay circuit includes a first network having an input and an output node, a second network having an input and an output, the input of the second network being coupled to the output node of the first network. The first network and the second network are configured such that: a glitch at the input to the first network having a length of approximately one-half of a standard glitch time or less does not cause the voltage at the output of the second network to cross a threshold, a glitch at the input to the first network having a length of between approximately one-half and two standard glitch times causes the voltage at the output of the second network to cross the threshold for less than the length of the glitch, and a glitch at the input to the first network having a length of greater than approximately two standard glitch times causes the voltage at the output of the second network to cross the threshold for approximately the time of the glitch. The method reduces the vulnerability of a latch to single event upsets. The latch includes a gate having an input and an output and a feedback path from the output to the input of the gate. The method includes inserting a delay into the feedback path and providing a delay in the gate.

  2. Method and Apparatus for Reducing the Vulnerability of Latches to Single Event Upsets

    NASA Technical Reports Server (NTRS)

    Shuler, Robert L., Jr. (Inventor)

    2002-01-01

    A delay circuit includes a first network having an input and an output node, a second network having an input and an output, the input of the second network being coupled to the output node of the first network. The first network and the second network are configured such that: a glitch at the input to the first network having a length of approximately one-half of a standard glitch time or less does not cause tile voltage at the output of the second network to cross a threshold, a glitch at the input to the first network having a length of between approximately one-half and two standard glitch times causes the voltage at the output of the second network to cross the threshold for less than the length of the glitch, and a glitch at the input to the first network having a length of greater than approximately two standard glitch times causes the voltage at the output of the second network to cross the threshold for approximately the time of the glitch. A method reduces the vulnerability of a latch to single event upsets. The latch includes a gate having an input and an output and a feedback path from the output to the input of the gate. The method includes inserting a delay into the feedback path and providing a delay in the gate.

  3. Effect of households' social networks on lice infestation among vulnerable Mexican children: a qualitative comparative analysis.

    PubMed

    Ortega-Marín, Lydia; Márquez-Serrano, Margarita; Lara-López, Luz M; Moncada, Ligia I; Idrovo, Alvaro J

    2013-10-01

    The prevalence of pediculosis is high among elementary and secondary school children, which favors the belief that infestation occurs more often in schools than in homes. This study explored the role of households' social networks in the transmission of head lice. Seventeen school children and their social networks (n = 22) from Acatlipa (Morelos, Mexico) participated in a prospective observational study during school vacation. The hair of all the school children was washed with shampoo containing permethrin at the beginning of the study and the incidence of pediculosis (O) was evaluated at the beginning of the school term (follow-up at 1.5 months). The sets included in the qualitative comparative analysis were sex (S), length of hair (H), baseline diagnostic of pediculosis (I) and degree (D) and infestation index (N) obtained through the analysis of social networks. The prevalence of pediculosis was the same at the beginning and the end of follow-up (17.6%). The degree of the school children's networks ranged between 2 and 14. There were 8 configurations, the most frequent being F*i*d*n*h. The most parsimonious configuration associated with the incidence of pediculosis was F*I*d*H (female, previous infestation, low degree and long hair), with a coverage of 0.344 and a consistency of 0.941. Indicators of social networks made it possible to identify the role of households' social networks in the transmission of lice. Individual actions such as the use of shampoo containing insecticides are temporary and, therefore, structural actions should be favored.

  4. Livestock and food security: vulnerability to population growth and climate change

    PubMed Central

    Godber, Olivia F; Wall, Richard

    2014-01-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. PMID:24692268

  5. Assessing Risks from Cyclones for Human Lives and Livelihoods in the Coastal Region of Bangladesh

    PubMed Central

    Khan, Amanat Ullah; Kervyn, Matthieu

    2017-01-01

    As a disaster prone country, Bangladesh is regularly hit by natural hazards, including devastating cyclones, such as in 1970, 1991 and 2007. Although the number of cyclones’ fatalities reduced from 0.3 million in 1970 to a few thousand or fewer in recent events, loss of lives and impact on livelihoods remains a concern. It depends on the meteorological characteristics of cyclone and the general vulnerability and capacity of the exposed population. In that perspective, a spatially explicit risk assessment is an essential step towards targeted disaster risk reduction. This study aims at analyzing the spatial variation of the different factors contributing to the risk for coastal communities at regional scale, including the distribution of the hazards, exposure, vulnerability and capacity. An exploratory factor analysis method is used to map vulnerability contrasts between local administrative units. Indexing and ranking using geospatial techniques are used to produce maps of exposure, hazard, vulnerability, capacities and risk. Results show that vulnerable populations and exposed areas are distributed along the land sea boundary, islands and major inland rivers. The hazard, assessed from the density of historical cyclone paths, is highest in the southwestern part of the coast. Whereas cyclones shelters are shown to properly serve the most vulnerable populations as priority evacuation centers, the overall pattern of capacity accounting for building quality and road network shows a more complex pattern. Resultant risk maps also provide a reasonable basis from which to take further structural measures to minimize loss of lives in the upcoming cyclones. PMID:28757550

  6. Climbing the Slope of Enlightenment during NASA's Arctic Boreal Vulnerability Experiment

    NASA Astrophysics Data System (ADS)

    Griffith, P. C.; Hoy, E.; Duffy, D.; McInerney, M.

    2015-12-01

    The Arctic Boreal Vulnerability Experiment (ABoVE) is a new field campaign sponsored by NASA's Terrestrial Ecology Program and designed to improve understanding of the vulnerability and resilience of Arctic and boreal social-ecological systems to environmental change (http://above.nasa.gov). ABoVE is integrating field-based studies, modeling, and data from airborne and satellite remote sensing. The NASA Center for Climate Simulation (NCCS) has partnered with the NASA Carbon Cycle and Ecosystems Office (CCEO) to create a high performance science cloud for this field campaign. The ABoVE Science Cloud combines high performance computing with emerging technologies and data management with tools for analyzing and processing geographic information to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage for "big data" with integrated data management, and integration of core variables from in-situ networks. The ABoVE Science Cloud is a collaboration that is accelerating the pace of new Arctic science for researchers participating in the field campaign. Specific examples of the utilization of the ABoVE Science Cloud by several funded projects will be presented.

  7. Systematic drug screening reveals specific vulnerabilities and co-resistance patterns in endocrine-resistant breast cancer.

    PubMed

    Kangaspeska, Sara; Hultsch, Susanne; Jaiswal, Alok; Edgren, Henrik; Mpindi, John-Patrick; Eldfors, Samuli; Brück, Oscar; Aittokallio, Tero; Kallioniemi, Olli

    2016-07-04

    The estrogen receptor (ER) inhibitor tamoxifen reduces breast cancer mortality by 31 % and has served as the standard treatment for ER-positive breast cancers for decades. However, 50 % of advanced ER-positive cancers display de novo resistance to tamoxifen, and acquired resistance evolves in 40 % of patients who initially respond. Mechanisms underlying resistance development remain poorly understood and new therapeutic opportunities are urgently needed. Here, we report the generation and characterization of seven tamoxifen-resistant breast cancer cell lines from four parental strains. Using high throughput drug sensitivity and resistance testing (DSRT) with 279 approved and investigational oncology drugs, exome-sequencing and network analysis, we for the first time, systematically determine the drug response profiles specific to tamoxifen resistance. We discovered emerging vulnerabilities towards specific drugs, such as ERK1/2-, proteasome- and BCL-family inhibitors as the cells became tamoxifen-resistant. Co-resistance to other drugs such as the survivin inhibitor YM155 and the chemotherapeutic agent paclitaxel also occurred. This study indicates that multiple molecular mechanisms dictate endocrine resistance, resulting in unexpected vulnerabilities to initially ineffective drugs, as well as in emerging co-resistances. Thus, combatting drug-resistant tumors will require patient-tailored strategies in order to identify new drug vulnerabilities, and to understand the associated co-resistance patterns.

  8. Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities

    ERIC Educational Resources Information Center

    Brooks, Tyson T.

    2013-01-01

    This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…

  9. 76 FR 7213 - ACRAnet, Inc.; SettlementOne Credit Corporation, and Sackett National Holdings, Inc.; Fajilan and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ... allege that hackers were able to exploit vulnerabilities in the computer networks of multiple end user clients, putting all consumer reports in those networks at risk. In multiple breaches, hackers accessed...

  10. Allele-Specific Chromatin Recruitment and Therapeutic Vulnerabilities of ESR1 Activating Mutations.

    PubMed

    Jeselsohn, Rinath; Bergholz, Johann S; Pun, Matthew; Cornwell, MacIntosh; Liu, Weihan; Nardone, Agostina; Xiao, Tengfei; Li, Wei; Qiu, Xintao; Buchwalter, Gilles; Feiglin, Ariel; Abell-Hart, Kayley; Fei, Teng; Rao, Prakash; Long, Henry; Kwiatkowski, Nicholas; Zhang, Tinghu; Gray, Nathanael; Melchers, Diane; Houtman, Rene; Liu, X Shirley; Cohen, Ofir; Wagle, Nikhil; Winer, Eric P; Zhao, Jean; Brown, Myles

    2018-02-12

    Estrogen receptor α (ER) ligand-binding domain (LBD) mutations are found in a substantial number of endocrine treatment-resistant metastatic ER-positive (ER + ) breast cancers. We investigated the chromatin recruitment, transcriptional network, and genetic vulnerabilities in breast cancer models harboring the clinically relevant ER mutations. These mutants exhibit both ligand-independent functions that mimic estradiol-bound wild-type ER as well as allele-specific neomorphic properties that promote a pro-metastatic phenotype. Analysis of the genome-wide ER binding sites identified mutant ER unique recruitment mediating the allele-specific transcriptional program. Genetic screens identified genes that are essential for the ligand-independent growth driven by the mutants. These studies provide insights into the mechanism of endocrine therapy resistance engendered by ER mutations and potential therapeutic targets. Copyright © 2018 Elsevier Inc. All rights reserved.

  11. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    NASA Technical Reports Server (NTRS)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  12. Issues, considerations and recommendations on emergency preparedness for vulnerable population groups.

    PubMed

    Chen, Jing; Wilkinson, Diana; Richardson, Richard B; Waruszynski, Barbara

    2009-06-01

    The Workshop on Emergency Preparedness for Vulnerable Population Groups was held on 2 and 3 March 2009 in Ottawa, ON, Canada. The purpose of the workshop was to enhance communications within the emergency community response network and to identify the needs and gaps of emergency preparedness against chemical, biological, radiological, nuclear and explosives events for vulnerable population groups. The workshop was organised to enable extensive round-table discussions and provide a summary of key issues, considerations and recommendations for emergency response planners.

  13. A Dynamic Game on Network Topology for Counterinsurgency Applications

    DTIC Science & Technology

    2015-03-26

    scenario. This study creates a dynamic game on network topology to provide insight into the effec- tiveness of offensive targeting strategies determined by...focused upon the diffusion of thoughts and innovations throughout complex social networks. Coleman et al. (1966) and Ryan & Gross (1950) investigated...free networks make them extremely resilient against errors but very vulnerable to attack. Most interest- ingly, a determined attacker can remove well

  14. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  15. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  16. Vulnerability and cosusceptibility determine the size of network cascades

    DOE PAGES

    Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.

    2017-01-27

    In a network, a local disturbance can propagate and eventually cause a substantial part of the system to fail in cascade events that are easy to conceptualize but extraordinarily difficult to predict. Furthermore, we develop a statistical framework that can predict cascade size distributions by incorporating two ingredients only: the vulnerability of individual components and the cosusceptibility of groups of components (i.e., their tendency to fail together). Using cascades in power grids as a representative example, we show that correlations between component failures define structured and often surprisingly large groups of cosusceptible components. Aside from their implications for blackout studies,more » these results provide insights and a new modeling framework for understanding cascades in financial systems, food webs, and complex networks in general.« less

  17. Prefrontal vulnerabilities and whole brain connectivity in aging and depression.

    PubMed

    Lamar, Melissa; Charlton, Rebecca A; Ajilore, Olusola; Zhang, Aifeng; Yang, Shaolin; Barrick, Thomas R; Rhodes, Emma; Kumar, Anand

    2013-07-01

    Studies exploring the underpinnings of age-related neurodegeneration suggest fronto-limbic alterations that are increasingly vulnerable in the presence of disease including late life depression. Less work has assessed the impact of this specific vulnerability on widespread brain circuitry. Seventy-nine older adults (healthy controls=45; late life depression=34) completed translational tasks shown in non-human primates to rely on fronto-limbic networks involving dorsolateral (Self-Ordered Pointing Task) or orbitofrontal (Object Alternation Task) cortices. A sub-sample of participants also completed diffusion tensor imaging for white matter tract quantification (uncinate and cingulum bundle; n=58) and whole brain tract-based spatial statistics (n=62). Despite task associations to specific white matter tracts across both groups, only healthy controls demonstrated significant correlations between widespread tract integrity and cognition. Thus, increasing Object Alternation Task errors were associated with decreasing fractional anisotropy in the uncinate in late life depression; however, only in healthy controls was the uncinate incorporated into a larger network of white matter vulnerability associating fractional anisotropy with Object Alternation Task errors using whole brain tract-based spatial statistics. It appears that the whole brain impact of specific fronto-limbic vulnerabilities in aging may be eclipsed in the presence of disease-specific neuropathology like that seen in late life depression. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  19. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross-learning and cross-comparison of, for example rural and urban areas, and different scales. Correspondingly, scale-specific resilience indicators and metrics will be developed to tailor methods to specific needs according to the scale of assessment (micro/local and macro/regional) and to the type of infrastructure. The traditional indicators normally used in structural analysis are not sufficient to understand how events happening on the networks can have cascading consequences. Moreover, effects have multidimensional (technical, economic, organizational and human), multiscale (micro and macro) and temporal characteristics (short- to long-term incidence). These considerations will guide to different activities: 1) computation of classic structural analysis indicators on the case studies in order to obtain an identity of the transport infrastructure and; 2) development of a set of new measures of resilience. To mitigate natural hazard risk a large amount of protection measures of different typology have been constructed following inhomogeneous reliability standards. The focus of this case study will be on resilience issues and decision making in the context of a large scale sectorial approach focused on transport infrastructure network.

  20. Altered Integration of Structural Covariance Networks in Young Children With Type 1 Diabetes.

    PubMed

    Hosseini, S M Hadi; Mazaika, Paul; Mauras, Nelly; Buckingham, Bruce; Weinzimer, Stuart A; Tsalikian, Eva; White, Neil H; Reiss, Allan L

    2016-11-01

    Type 1 diabetes mellitus (T1D), one of the most frequent chronic diseases in children, is associated with glucose dysregulation that contributes to an increased risk for neurocognitive deficits. While there is a bulk of evidence regarding neurocognitive deficits in adults with T1D, little is known about how early-onset T1D affects neural networks in young children. Recent data demonstrated widespread alterations in regional gray matter and white matter associated with T1D in young children. These widespread neuroanatomical changes might impact the organization of large-scale brain networks. In the present study, we applied graph-theoretical analysis to test whether the organization of structural covariance networks in the brain for a cohort of young children with T1D (N = 141) is altered compared to healthy controls (HC; N = 69). While the networks in both groups followed a small world organization-an architecture that is simultaneously highly segregated and integrated-the T1D network showed significantly longer path length compared with HC, suggesting reduced global integration of brain networks in young children with T1D. In addition, network robustness analysis revealed that the T1D network model showed more vulnerability to neural insult compared with HC. These results suggest that early-onset T1D negatively impacts the global organization of structural covariance networks and influences the trajectory of brain development in childhood. This is the first study to examine structural covariance networks in young children with T1D. Improving glycemic control for young children with T1D might help prevent alterations in brain networks in this population. Hum Brain Mapp 37:4034-4046, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  1. Analysis of the Spatial Organization of Pastures as a Contact Network, Implications for Potential Disease Spread and Biosecurity in Livestock, France, 2010.

    PubMed

    Palisson, Aurore; Courcoul, Aurélie; Durand, Benoit

    2017-01-01

    The use of pastures is part of common herd management practices for livestock animals, but contagion between animals located on neighbouring pastures is one of the major modes of infectious disease transmission between herds. At the population level, this transmission is strongly constrained by the spatial organization of pastures. The aim of this study was to answer two questions: (i) is the spatial configuration of pastures favourable to the spread of infectious diseases in France? (ii) would biosecurity measures allow decreasing this vulnerability? Based on GIS data, the spatial organization of pastures was represented using networks. Nodes were the 3,159,787 pastures reported in 2010 by the French breeders to claim the Common Agricultural Policy subsidies. Links connected pastures when the distance between them was below a predefined threshold. Premises networks were obtained by aggregating into a single node all the pastures under the same ownership. Although the pastures network was very fragmented when the distance threshold was short (1.5 meters, relevant for a directly-transmitted disease), it was not the case when the distance threshold was larger (500 m, relevant for a vector-borne disease: 97% of the nodes in the largest connected component). The premises network was highly connected as the largest connected component always included more than 83% of the nodes, whatever the distance threshold. Percolation analyses were performed to model the population-level efficacy of biosecurity measures. Percolation thresholds varied according to the modelled biosecurity measures and to the distance threshold. They were globally high (e.g. >17% of nodes had to be removed, mimicking the confinement of animals inside farm buildings, to obtain the disappearance of the large connected component). The network of pastures thus appeared vulnerable to the spread of diseases in France. Only a large acceptance of biosecurity measures by breeders would allow reducing this structural risk.

  2. Analysis of the Spatial Organization of Pastures as a Contact Network, Implications for Potential Disease Spread and Biosecurity in Livestock, France, 2010

    PubMed Central

    Palisson, Aurore; Courcoul, Aurélie; Durand, Benoit

    2017-01-01

    The use of pastures is part of common herd management practices for livestock animals, but contagion between animals located on neighbouring pastures is one of the major modes of infectious disease transmission between herds. At the population level, this transmission is strongly constrained by the spatial organization of pastures. The aim of this study was to answer two questions: (i) is the spatial configuration of pastures favourable to the spread of infectious diseases in France? (ii) would biosecurity measures allow decreasing this vulnerability? Based on GIS data, the spatial organization of pastures was represented using networks. Nodes were the 3,159,787 pastures reported in 2010 by the French breeders to claim the Common Agricultural Policy subsidies. Links connected pastures when the distance between them was below a predefined threshold. Premises networks were obtained by aggregating into a single node all the pastures under the same ownership. Although the pastures network was very fragmented when the distance threshold was short (1.5 meters, relevant for a directly-transmitted disease), it was not the case when the distance threshold was larger (500 m, relevant for a vector-borne disease: 97% of the nodes in the largest connected component). The premises network was highly connected as the largest connected component always included more than 83% of the nodes, whatever the distance threshold. Percolation analyses were performed to model the population-level efficacy of biosecurity measures. Percolation thresholds varied according to the modelled biosecurity measures and to the distance threshold. They were globally high (e.g. >17% of nodes had to be removed, mimicking the confinement of animals inside farm buildings, to obtain the disappearance of the large connected component). The network of pastures thus appeared vulnerable to the spread of diseases in France. Only a large acceptance of biosecurity measures by breeders would allow reducing this structural risk. PMID:28060913

  3. A systems approach to the policy-level risk assessment of exotic animal diseases: network model and application to classical swine fever.

    PubMed

    Delgado, João; Pollard, Simon; Snary, Emma; Black, Edgar; Prpich, George; Longhurst, Phil

    2013-08-01

    Exotic animal diseases (EADs) are characterized by their capacity to spread global distances, causing impacts on animal health and welfare with significant economic consequences. We offer a critique of current import risk analysis approaches employed in the EAD field, focusing on their capacity to assess complex systems at a policy level. To address the shortcomings identified, we propose a novel method providing a systematic analysis of the likelihood of a disease incursion, developed by reference to the multibarrier system employed for the United Kingdom. We apply the network model to a policy-level risk assessment of classical swine fever (CSF), a notifiable animal disease caused by the CSF virus. In doing so, we document and discuss a sequence of analyses that describe system vulnerabilities and reveal the critical control points (CCPs) for intervention, reducing the likelihood of U.K. pig herds being exposed to the CSF virus. © 2012 Society for Risk Analysis.

  4. Collective arrangements and social networks: Coping strategies for the poor households in the Great Ruaha Catchment in Tanzania

    NASA Astrophysics Data System (ADS)

    Kadigi, Reuben M. J.; Mdoe, N. S. Y.; Ashimogo, G. C.

    Access to water and land resources underpins the socio-economic fabric of many societies in the Southern Africa region, which is characterized broadly as underdeveloped with widespread food insecurity, exacerbated by persistent droughts, erratic rainfalls and increasing human populations. The availability of land and water resources is increasingly diminishing and becoming a stumbling block to the development of the agrarian societies in the region. The poor households have in turn adopted new livelihood coping mechanisms but little research has been done to assess the effectiveness of these ‘instruments’. Consequently, the concepts of sustainable water resources management and agricultural development have remained elusive and poorly understood by policy makers as well as by water resources planners and managers. Recognizing this, a study was conducted between 2002 and 2005 under the RIPARWIN (Raising Irrigation Productivity and Releasing Water for Intersectoral Needs) project to assess the spatial dynamics of livelihood capital, vulnerability and coping strategies for the poor agrarian households in the Upper Great Ruaha River Catchment (GRRC) in Tanzania. The results of analysis showed an array of livelihood platforms and institutional contexts that act to shape the existing livelihood typologies in the GRRC. In addition, the results showed a gradual increase in household vulnerability from upstream to downstream, particularly in terms of access to physical and natural assets. Vulnerability was found to be directly associated with the number of dependants. The female-headed households were relatively more likely to be vulnerable than the male-headed households (cf. probabilities of 27% and 21%, respectively). The value of collective arrangements and drawing on social networks crosscut all social strata and ranked as the most common livelihood strategy. This suggests that the scope for reducing vulnerability among the poor households in the GRRC critically depends on the existing institutional arrangements and mechanisms. Of paramount importance is perhaps the need to facilitate the establishment and empowerment of water use associations and apex bodies. In the study area, this appears to be promising enough to build ‘strong’ institutional platforms through which water and land resources would be managed sustainably.

  5. A model for assessing the systemic vulnerability in landslide prone areas

    NASA Astrophysics Data System (ADS)

    Pascale, S.; Sdao, F.; Sole, A.

    2010-07-01

    The objectives of spatial planning should include the definition and assessment of possible mitigation strategies regarding the effects of natural hazards on the surrounding territory. Unfortunately, however, there is often a lack of adequate tools to provide necessary support to the local bodies responsible for land management. This paper deals with the conception, the development and the validation of an integrated numerical model for assessing systemic vulnerability in complex and urbanized landslide-prone areas. The proposed model considers this vulnerability not as a characteristic of a particular element at risk, but as a peculiarity of a complex territorial system, in which the elements are reciprocally linked in a functional way. It is an index of the tendency of a given territorial element to suffer damage (usually of a functional kind) due to its interconnections with other elements of the same territorial system. The innovative nature of this work also lies in the formalization of a procedure based on a network of influences for an adequate assessment of such "systemic" vulnerability. This approach can be used to obtain information which is useful, in any given situation of a territory hit by a landslide event, for the identification of the element which has suffered the most functional damage, ie the most "critical" element and the element which has the greatest repercussions on other elements of the system and thus a "decisive" role in the management of the emergency. This model was developed within a GIS system through the following phases: 1. the topological characterization of the territorial system studied and the assessment of the scenarios in terms of spatial landslide hazard. A statistical method, based on neural networks was proposed for the assessment of landslide hazard; 2. the analysis of the direct consequences of a scenario event on the system; 3. the definition of the assessment model of systemic vulnerability in landslide-prone areas. To highlight the potentialities of the proposed approach we have described a specific case study of landslide hazard in the local council area of Potenza.

  6. Availability: A Metric for Nucleic Acid Strand Displacement Systems.

    PubMed

    Olson, Xiaoping; Kotani, Shohei; Padilla, Jennifer E; Hallstrom, Natalya; Goltry, Sara; Lee, Jeunghoon; Yurke, Bernard; Hughes, William L; Graugnard, Elton

    2017-01-20

    DNA strand displacement systems have transformative potential in synthetic biology. While powerful examples have been reported in DNA nanotechnology, such systems are plagued by leakage, which limits network stability, sensitivity, and scalability. An approach to mitigate leakage in DNA nanotechnology, which is applicable to synthetic biology, is to introduce mismatches to complementary fuel sequences at key locations. However, this method overlooks nuances in the secondary structure of the fuel and substrate that impact the leakage reaction kinetics in strand displacement systems. In an effort to quantify the impact of secondary structure on leakage, we introduce the concepts of availability and mutual availability and demonstrate their utility for network analysis. Our approach exposes vulnerable locations on the substrate and quantifies the secondary structure of fuel strands. Using these concepts, a 4-fold reduction in leakage has been achieved. The result is a rational design process that efficiently suppresses leakage and provides new insight into dynamic nucleic acid networks.

  7. Complexity of the international agro-food trade network and its impact on food safety.

    PubMed

    Ercsey-Ravasz, Mária; Toroczkai, Zoltán; Lakner, Zoltán; Baranyi, József

    2012-01-01

    With the world's population now in excess of 7 billion, it is vital to ensure the chemical and microbiological safety of our food, while maintaining the sustainability of its production, distribution and trade. Using UN databases, here we show that the international agro-food trade network (IFTN), with nodes and edges representing countries and import-export fluxes, respectively, has evolved into a highly heterogeneous, complex supply-chain network. Seven countries form the core of the IFTN, with high values of betweenness centrality and each trading with over 77% of all the countries in the world. Graph theoretical analysis and a dynamic food flux model show that the IFTN provides a vehicle suitable for the fast distribution of potential contaminants but unsuitable for tracing their origin. In particular, we show that high values of node betweenness and vulnerability correlate well with recorded large food poisoning outbreaks.

  8. Climate change and vulnerability of bull trout (Salvelinus confluentus ) in a fire-prone landscape

    Treesearch

    Jeffrey A. Falke; Rebecca L. Flitcroft; Jason B. Dunham; Kristina M. McNyset; Paul F. Hessburg; Gordon H. Reeves; C. Tara Marshall

    2015-01-01

    Linked atmospheric and wildfire changes will complicate future management of native coldwater fishes in fire-prone landscapes, and new approaches to management that incorporate uncertainty are needed to address this challenge. We used a Bayesian network (BN) approach to evaluate population vulnerability of bull trout (Salvelinus confluentus) in the Wenatchee River...

  9. Neurodevelopmental alterations of large-scale structural networks in children with new-onset epilepsy.

    PubMed

    Bonilha, Leonardo; Tabesh, Ali; Dabbs, Kevin; Hsu, David A; Stafstrom, Carl E; Hermann, Bruce P; Lin, Jack J

    2014-08-01

    Recent neuroimaging and behavioral studies have revealed that children with new onset epilepsy already exhibit brain structural abnormalities and cognitive impairment. How the organization of large-scale brain structural networks is altered near the time of seizure onset and whether network changes are related to cognitive performances remain unclear. Recent studies also suggest that regional brain volume covariance reflects synchronized brain developmental changes. Here, we test the hypothesis that epilepsy during early-life is associated with abnormalities in brain network organization and cognition. We used graph theory to study structural brain networks based on regional volume covariance in 39 children with new-onset seizures and 28 healthy controls. Children with new-onset epilepsy showed a suboptimal topological structural organization with enhanced network segregation and reduced global integration compared with controls. At the regional level, structural reorganization was evident with redistributed nodes from the posterior to more anterior head regions. The epileptic brain network was more vulnerable to targeted but not random attacks. Finally, a subgroup of children with epilepsy, namely those with lower IQ and poorer executive function, had a reduced balance between network segregation and integration. Taken together, the findings suggest that the neurodevelopmental impact of new onset childhood epilepsies alters large-scale brain networks, resulting in greater vulnerability to network failure and cognitive impairment. Copyright © 2014 Wiley Periodicals, Inc.

  10. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

    PubMed Central

    Shim, Kyusung; Do, Nhu Tri; An, Beongku

    2017-01-01

    In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks. PMID:28212286

  11. If it walks like a duck: nanosensor threat assessment

    NASA Astrophysics Data System (ADS)

    Chachis, George C.

    2003-09-01

    A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.

  12. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    NASA Astrophysics Data System (ADS)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  13. Using GA-Ridge regression to select hydro-geological parameters influencing groundwater pollution vulnerability.

    PubMed

    Ahn, Jae Joon; Kim, Young Min; Yoo, Keunje; Park, Joonhong; Oh, Kyong Joo

    2012-11-01

    For groundwater conservation and management, it is important to accurately assess groundwater pollution vulnerability. This study proposed an integrated model using ridge regression and a genetic algorithm (GA) to effectively select the major hydro-geological parameters influencing groundwater pollution vulnerability in an aquifer. The GA-Ridge regression method determined that depth to water, net recharge, topography, and the impact of vadose zone media were the hydro-geological parameters that influenced trichloroethene pollution vulnerability in a Korean aquifer. When using these selected hydro-geological parameters, the accuracy was improved for various statistical nonlinear and artificial intelligence (AI) techniques, such as multinomial logistic regression, decision trees, artificial neural networks, and case-based reasoning. These results provide a proof of concept that the GA-Ridge regression is effective at determining influential hydro-geological parameters for the pollution vulnerability of an aquifer, and in turn, improves the AI performance in assessing groundwater pollution vulnerability.

  14. The introduction of dengue follows transportation infrastructure changes in the state of Acre, Brazil: A network-based analysis.

    PubMed

    Lana, Raquel Martins; Gomes, Marcelo Ferreira da Costa; Lima, Tiago França Melo de; Honório, Nildimar Alves; Codeço, Cláudia Torres

    2017-11-01

    Human mobility, presence and passive transportation of Aedes aegypti mosquito, and environmental characteristics are a group of factors which contribute to the success of dengue spread and establishment. To understand this process, we assess data from dengue national and municipal basins regarding population and demographics, transportation network, human mobility, and Ae. aegypti monitoring for the Brazilian state of Acre since the first recorded dengue case in the year 2000 to the year 2015. During this period, several changes in Acre's transport infrastructure and urbanization have been started. To reconstruct the process of dengue introduction in Acre, we propose an analytic framework based on concepts used in malaria literature, namely vulnerability and receptivity, to inform risk assessments in dengue-free regions as well as network theory concepts for disease invasion and propagation. We calculate the probability of dengue importation to Acre from other Brazilian states, the evolution of dengue spread between Acrean municipalities and dengue establishment in the state. Our findings suggest that the landscape changes associated with human mobility have created favorable conditions for the establishment of dengue virus transmission in Acre. The revitalization of its major roads, as well as the increased accessibility by air to and within the state, have increased dengue vulnerability. Unplanned urbanization and population growth, as observed in Acre during the period of study, contribute to ideal conditions for Ae. aegypti mosquito establishment, increase the difficulty in mosquito control and consequently its local receptivity.

  15. The introduction of dengue follows transportation infrastructure changes in the state of Acre, Brazil: A network-based analysis

    PubMed Central

    de Lima, Tiago França Melo; Honório, Nildimar Alves; Codeço, Cláudia Torres

    2017-01-01

    Human mobility, presence and passive transportation of Aedes aegypti mosquito, and environmental characteristics are a group of factors which contribute to the success of dengue spread and establishment. To understand this process, we assess data from dengue national and municipal basins regarding population and demographics, transportation network, human mobility, and Ae. aegypti monitoring for the Brazilian state of Acre since the first recorded dengue case in the year 2000 to the year 2015. During this period, several changes in Acre’s transport infrastructure and urbanization have been started. To reconstruct the process of dengue introduction in Acre, we propose an analytic framework based on concepts used in malaria literature, namely vulnerability and receptivity, to inform risk assessments in dengue-free regions as well as network theory concepts for disease invasion and propagation. We calculate the probability of dengue importation to Acre from other Brazilian states, the evolution of dengue spread between Acrean municipalities and dengue establishment in the state. Our findings suggest that the landscape changes associated with human mobility have created favorable conditions for the establishment of dengue virus transmission in Acre. The revitalization of its major roads, as well as the increased accessibility by air to and within the state, have increased dengue vulnerability. Unplanned urbanization and population growth, as observed in Acre during the period of study, contribute to ideal conditions for Ae. aegypti mosquito establishment, increase the difficulty in mosquito control and consequently its local receptivity. PMID:29149175

  16. The Oncogenic Palmitoyl-Protein Network in Prostate Cancer

    DTIC Science & Technology

    2011-03-31

    network is vulnerable to a diet and drug intervention that will employ a Food and Drug Administration-approved cholesterol-reducing agent ( ezetimibe ...therapeutic value of ezetimibe . 15. SUBJECT TERMS castrate-resistant prostate cancer, palmitoylation, signal transduction, S-acylation 16...that this network might be sensitive to pharmacologic targeting of cholesterol using the cholesterol-lowering drug, ezetimibe . Our hypothesis is that

  17. Game among interdependent networks: The impact of rationality on system robustness

    NASA Astrophysics Data System (ADS)

    Fan, Yuhang; Cao, Gongze; He, Shibo; Chen, Jiming; Sun, Youxian

    2016-12-01

    Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own payoffs. There exists a game among these entities when designing their own networks. In this paper, we study the game investigating how the rational behaviors of entities impact the system robustness. We first introduce a mathematical model to quantify the interacting payoffs among varying entities. Then we study the Nash equilibrium of the game and compare it with the optimal social welfare. We reveal that the cooperation among different entities can be reached to maximize the social welfare in continuous game only when the average degree of each network is constant. Therefore, the huge gap between Nash equilibrium and optimal social welfare generally exists. The rationality of entities makes the system inherently deficient and even renders it extremely vulnerable in some cases. We analyze our model for two concrete systems with continuous strategy space and discrete strategy space, respectively. Furthermore, we uncover some factors (such as weakening coupled strength of interdependent networks, designing a suitable topology dependence of the system) that help reduce the gap and the system vulnerability.

  18. Aquatic invasive species early detection in the Great Lakes: Lessons concerning strategy

    EPA Science Inventory

    Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...

  19. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

    PubMed Central

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-01-01

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171

  20. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    PubMed

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  1. A Bayesian network to predict vulnerability to sea-level rise: data report

    USGS Publications Warehouse

    Gutierrez, Benjamin T.; Plant, Nathaniel G.; Thieler, E. Robert

    2011-01-01

    During the 21st century, sea-level rise is projected to have a wide range of effects on coastal environments, development, and infrastructure. Consequently, there has been an increased focus on developing modeling or other analytical approaches to evaluate potential impacts to inform coastal management. This report provides the data that were used to develop and evaluate the performance of a Bayesian network designed to predict long-term shoreline change due to sea-level rise. The data include local rates of relative sea-level rise, wave height, tide range, geomorphic classification, coastal slope, and shoreline-change rate compiled as part of the U.S. Geological Survey Coastal Vulnerability Index for the U.S. Atlantic coast. In this project, the Bayesian network is used to define relationships among driving forces, geologic constraints, and coastal responses. Using this information, the Bayesian network is used to make probabilistic predictions of shoreline change in response to different future sea-level-rise scenarios.

  2. Livestock and food security: vulnerability to population growth and climate change.

    PubMed

    Godber, Olivia F; Wall, Richard

    2014-10-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. © 2014 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  3. DTI-based connectome analysis of adolescents with major depressive disorder reveals hypoconnectivity of the right caudate.

    PubMed

    Tymofiyeva, Olga; Connolly, Colm G; Ho, Tiffany C; Sacchet, Matthew D; Henje Blom, Eva; LeWinn, Kaja Z; Xu, Duan; Yang, Tony T

    2017-01-01

    Adolescence is a vulnerable period for the onset of major depressive disorder (MDD). While some studies have shown white matter alterations in adolescent MDD, there is still a gap in understanding how the brain is affected at a network level. We compared diffusion tensor imaging (DTI)-based brain networks in a cohort of 57 adolescents with MDD and 41 well-matched healthy controls who completed self-reports of depression symptoms and stressful life events. Using atlas-based brain regions as network nodes and tractography streamline count or mean fractional anisotropy (FA) as edge weights, we examined weighted local and global network properties and performed Network-Based Statistic (NBS) analysis. While there were no significant group differences in the global network properties, the FA-weighted node strength of the right caudate was significantly lower in depressed adolescents and correlated positively with age across both groups. The NBS analysis revealed a cluster of lower FA-based connectivity in depressed subjects centered on the right caudate, including connections to frontal gyri, insula, and anterior cingulate. Within this cluster, the most robust difference between groups was the connection between the right caudate and middle frontal gyrus. This connection showed a significant diagnosis by stress interaction and a negative correlation with total stress in depressed adolescents. Use of DTI-based tractography, one atlas-based parcellation, and FA values to characterize brain networks represent this study's limitations. Our results allowed us to suggest caudate-centric models of dysfunctional processes underlying adolescent depression, which might guide future studies and help better understand and treat this disorder. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Making Supply Chains Resilient to Floods Using a Bayesian Network

    NASA Astrophysics Data System (ADS)

    Haraguchi, M.

    2015-12-01

    Natural hazards distress the global economy by disrupting the interconnected supply chain networks. Manufacturing companies have created cost-efficient supply chains by reducing inventories, streamlining logistics and limiting the number of suppliers. As a result, today's supply chains are profoundly susceptible to systemic risks. In Thailand, for example, the GDP growth rate declined by 76 % in 2011 due to prolonged flooding. Thailand incurred economic damage including the loss of USD 46.5 billion, approximately 70% of which was caused by major supply chain disruptions in the manufacturing sector. Similar problems occurred after the Great East Japan Earthquake and Tsunami in 2011, the Mississippi River floods and droughts during 2011 - 2013, and Hurricane Sandy in 2012. This study proposes a methodology for modeling supply chain disruptions using a Bayesian network analysis (BNA) to estimate expected values of countermeasures of floods, such as inventory management, supplier management and hard infrastructure management. We first performed a spatio-temporal correlation analysis between floods and extreme precipitation data for the last 100 years at a global scale. Then we used a BNA to create synthetic networks that include variables associated with the magnitude and duration of floods, major components of supply chains and market demands. We also included decision variables of countermeasures that would mitigate potential losses caused by supply chain disruptions. Finally, we conducted a cost-benefit analysis by estimating the expected values of these potential countermeasures while conducting a sensitivity analysis. The methodology was applied to supply chain disruptions caused by the 2011 Thailand floods. Our study demonstrates desirable typical data requirements for the analysis, such as anonymized supplier network data (i.e. critical dependencies, vulnerability information of suppliers) and sourcing data(i.e. locations of suppliers, and production rates and volume), and data from previous experiences (i.e. companies' risk mitigation strategy decisions).

  5. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  6. Tau, amyloid, and cascading network failure across the Alzheimer's disease spectrum.

    PubMed

    Jones, David T; Graff-Radford, Jonathan; Lowe, Val J; Wiste, Heather J; Gunter, Jeffrey L; Senjem, Matthew L; Botha, Hugo; Kantarci, Kejal; Boeve, Bradley F; Knopman, David S; Petersen, Ronald C; Jack, Clifford R

    2017-12-01

    Functionally related brain regions are selectively vulnerable to Alzheimer's disease pathophysiology. However, molecular markers of this pathophysiology (i.e., beta-amyloid and tau aggregates) have discrepant spatial and temporal patterns of progression within these selectively vulnerable brain regions. Existing reductionist pathophysiologic models cannot account for these large-scale spatiotemporal inconsistencies. Within the framework of the recently proposed cascading network failure model of Alzheimer's disease, however, these large-scale patterns are to be expected. This model postulates the following: 1) a tau-associated, circumscribed network disruption occurs in brain regions specific to a given phenotype in clinically normal individuals; 2) this disruption can trigger phenotype independent, stereotypic, and amyloid-associated compensatory brain network changes indexed by changes in the default mode network; 3) amyloid deposition marks a saturation of functional compensation and portends an acceleration of the inciting phenotype specific, and tau-associated, network failure. With the advent of in vivo molecular imaging of tau pathology, combined with amyloid and functional network imaging, it is now possible to investigate the relationship between functional brain networks, tau, and amyloid across the disease spectrum within these selectively vulnerable brain regions. In a large cohort (n = 218) spanning the Alzheimer's disease spectrum from young, amyloid negative, cognitively normal subjects to Alzheimer's disease dementia, we found several distinct spatial patterns of tau deposition, including 'Braak-like' and 'non-Braak-like', across functionally related brain regions. Rather than arising focally and spreading sequentially, elevated tau signal seems to occur system-wide based on inferences made from multiple cross-sectional analyses we conducted looking at regional patterns of tau signal. Younger age-of-disease-onset was associated with 'non-Braak-like' patterns of tau, suggesting an association with atypical clinical phenotypes. As predicted by the cascading network failure model of Alzheimer's disease, we found that amyloid is a partial mediator of the relationship between functional network failure and tau deposition in functionally connected brain regions. This study implicates large-scale brain networks in the pathophysiology of tau deposition and offers support to models incorporating large-scale network physiology into disease models linking tau and amyloid, such as the cascading network failure model of Alzheimer's disease. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  7. How urban system vulnerabilities to flooding could be assessed to improve resilience and adaptation in spatial planning

    NASA Astrophysics Data System (ADS)

    Pasi, Riccardo; Viavattene, Christophe; La Loggia, Goffredo

    2016-04-01

    Natural hazards damage assets and infrastructure inducing disruptions to urban functions and key daily services. These disruptions may be short or long with a variable spatial scale of impact. From an urban planning perspective, measuring these disruptions and their consequences at an urban scale is fundamental in order to develop more resilient cities. Whereas the assessment of physical vulnerabilities and direct damages is commonly addressed, new methodologies for assessing the systemic vulnerability at the urban scale are required to reveal these disruptions and their consequences. Physical and systemic vulnerability should be measured in order to reflect the multifaceted fragility of cities in the face of external stress, both in terms of the natural/built environment and socio-economic sphere. Additionally, a systemic approach allows the consideration of vulnerability across different spatial scales, as impacts may vary and be transmitted across local, regional or national levels. Urban systems are spatially distributed and the nature of this can have significant effects on flood impacts. The proposed approach identifies the vulnerabilities of flooding within urban contexts, including both in terms of single elementary units (buildings, infrastructures, people, etc.) and systemic functioning (urban functions and daily life networks). Direct losses are appraised initially using conventional methodologies (e.g. depth-damage functions). This aims to both understand the spatial distribution of physical vulnerability and associated losses and, secondly, to identify the most vulnerable building types and ways to improve the physical adaptation of our cities, proposing changes to building codes, design principles and other municipal regulation tools. The subsequent systemic approach recognises the city as a collection of sub-systems or functional units (such as neighbourhoods and suburbs) providing key daily services for inhabitants (e.g. healthcare facilities, schools, administration offices, food shops, leisure and cultural services etc.) and which are interconnected through transport networks. Moreover, each city is part of broader systems - which may or may not follow administrative boundaries - and, as such, need to be connected to its wider surroundings, in a multi-scalar perspective. The systemic analysis, herein limited to residential households, evaluates the presence, the distribution among functional units and the redundancy of key daily services. As such, systemic interdependences between neighbourhoods/suburbs and municipalities emerge, highlighting how systemic vulnerability spreads beyond the flooded areas. This aims to understand which planning patterns and existing mixed-use developments are more flood resilient (thereby informing future urban development/regeneration) and which infrastructure and assets have a key role within the urban system (and have therefore to be prioritised for protection). The methodology is currently developed through an extensive use of Geographic Information Systems (GIS) and applied to an Italian case study (Noale municipality, Venice). Current developments and on-going issues in its application and in the data collection (including the use of aerial survey data) will be discussed in the presentation.

  8. Towards a Proper Assignment of Systemic Risk: The Combined Roles of Network Topology and Shock Characteristics

    PubMed Central

    Loepfe, Lasse; Cabrales, Antonio; Sánchez, Angel

    2013-01-01

    The 2007-2008 financial crisis solidified the consensus among policymakers that a macro-prudential approach to regulation and supervision should be adopted. The currently preferred policy option is the regulation of capital requirements, with the main focus on combating procyclicality and on identifying the banks that have a high systemic importance, those that are “too big to fail”. Here we argue that the concept of systemic risk should include the analysis of the system as a whole and we explore systematically the most important properties for policy purposes of networks topology on resistance to shocks. In a thorough study going from analytical models to empirical data, we show two sharp transitions from safe to risky regimes: 1) diversification becomes harmful with just a small fraction (~2%) of the shocks sampled from a fat tailed shock distributions and 2) when large shocks are present a critical link density exists where an effective giant cluster forms and most firms become vulnerable. This threshold depends on the network topology, especially on modularity. Firm size heterogeneity has important but diverse effects that are heavily dependent on shock characteristics. Similarly, degree heterogeneity increases vulnerability only when shocks are directed at the most connected firms. Furthermore, by studying the structure of the core of the transnational corporation network from real data, we show that its stability could be clearly increased by removing some of the links with highest centrality betweeness. Our results provide a novel insight and arguments for policy makers to focus surveillance on the connections between firms, in addition to capital requirements directed at the nodes. PMID:24147017

  9. Predicting and Controlling Complex Networks

    DTIC Science & Technology

    2015-06-22

    vulnerability and to generate a global view of network security against attacks. By deploying network sensors at particular points in the Internet ...48006, 1-6 (2011). 2 13. L. Huang and Y.-C. Lai, “Cascading dynamics in complex quantum networks,” Chaos 21, 025107, 1-6 (2011). This work was selected...by July 2011 issue of Virtual Journal of Quantum Information (http://www.vjquantuminfo.org). 14. W.-X. Wang, Y.-C. Lai, and D. Armbruster, “Cascading

  10. Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense

    DTIC Science & Technology

    2016-12-08

    in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully

  11. Cognitive Radio Networks for Tactical Wireless Communications

    DTIC Science & Technology

    2014-12-01

    exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been

  12. A Vulnerability Index and Analysis for the Road Network of Rural Chile

    NASA Astrophysics Data System (ADS)

    Braun, Andreas; Stötzer, Johanna; Kubisch, Susanne; Dittrich, Andre; Keller, Sina

    2017-04-01

    Natural hazards impose considerable threats to the physical and socio-economic wellbeing of people, a fact, which is well understood and investigated for many regions. However, not only people are vulnerable. During the last decades, a considerable amount of literature has focussed the particular vulnerability of the critical infrastructure: for example road networks. Considering critical infrastructure, far less reliable information exists for many regions worldwide - particularly, regions outside of the so called developed world. Critical infrastructure is destroyed in many disasters, causing cascade and follow up effects, for instance, impediments during evacuation, rescue and during the resilience phase. These circumstances, which are general enough to be applied to most regions, aggravate in regions characterized by high disparities between the urban and the rural sphere. Peripheral rural areas are especially prone to get isolated due to defects of the few roads which connect them to larger urban centres (where, frequently, disaster and emergency actors are situated). The rural area of Central Chile is a appropriate example for these circumstances. It is prone to destruction by several geo-hazards and furthermore, characterized by the aforementioned disparities. Past disasters, e.g. the 1991 Cerro Hudson eruption and the 2010 Maule earthquake have led to follow up effects (e.g. farmers, being unable to evacuate their animals due to road failures in the first case, and difficultires to evacuate people from places such as Caleta Tumbes or Dichato, which are connected by just a single road only in the second). The contribution develops a methodology to investigate into the critical infrastructure of such places. It develops a remoteness index for Chile, which identifies remote, peripheral rural areas, prone to get isolated due to road network failures during disasters. The approach is graph based. It offers particular advantages for regions like rural Chile since 1. it does not require traffic flow data which do not exist, 2. identifies peripheral areas particularly well, 3. identifies both nodes (places) prone to isolation and edges (roads) critical for the connectivity of rural areas, 4. based on a mathematical structure, it implies several possible planning solutions to reduce vulnerability of the critical infrastructure and people dependent on it. The methodology is presented and elaborated theoretically. Afterwards, it is demonstrated on an actual dataset from central Chile. It is demonstrated, how the methodology can be applied to derive planning solutions for peripheral rural areas.

  13. Response of power systems to the San Fernando Valley earthquake of 9 February 1971. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schiff, A.J.; Yao, J.T.P.

    1972-01-01

    The impact of the San Fernando Valley earthquake on electric power systems is discussed. Particular attention focused on the following three areas; (1) the effects of an earthquake on the power network in the Western States, (2) the failure of subsystems and components of the power system, and (3) the loss of power to hospitals. The report includes sections on the description and functions of major components of a power network, existing procedures to protect the network, safety devices within the system which influence the network, a summary of the effects of the San Fernando Valley earthquake on the Westernmore » States Power Network, and present efforts to reduce the network vulnerability to faults. Also included in the report are a review of design procedures and practices prior to the San Fernando Valley earthquake and descriptions of types of damage to electrical equipment, dynamic analysis of equipment failures, equipment surviving the San Fernando Valley earthquake and new seismic design specifications. In addition, some observations and insights gained during the study, which are not directly related to power systems are discussed.« less

  14. The growth of partnerships to support patient safety practice adoption.

    PubMed

    Mendel, Peter; Damberg, Cheryl L; Sorbero, Melony E S; Varda, Danielle M; Farley, Donna O

    2009-04-01

    To document the numbers and types of interorganizational partnerships within the national patient safety domain, changes over time in these networks, and their potential for disseminating patient safety knowledge and practices. Self-reported information gathered from representatives of national-level organizations active in promoting patient safety. Social network analysis was used to examine the structure and composition of partnership networks and changes between 2004 and 2006. Two rounds of structured telephone interviews (n=35 organizations in 2004 and 55 in 2006). Patient safety partnerships expanded between 2004 and 2006. The average number of partnerships per interviewed organization increased 40 percent and activities per reported partnership increased over 50 percent. Partnerships increased in all activity domains, particularly dissemination and tools development. Fragmentation of the overall partnership network decreased and potential for information flow increased. Yet network centralization increased, suggesting vulnerability to partnership failure if key participants disengage. Growth in partnerships signifies growing strength in the capacity to disseminate and implement patient safety advancements in the U.S. health care system. The centrality of AHRQ in these networks of partnerships bodes well for its leadership role in disseminating information, tools, and practices generated by patient safety research projects.

  15. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    ERIC Educational Resources Information Center

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  16. Knowledge to serve the city: insights from an emerging knowledge-action network to address vulnerability and sustainability in San Juan, Puerto Rico

    Treesearch

    T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro

    2014-01-01

    This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...

  17. Evaluating Machine Learning Classifiers for Hybrid Network Intrusion Detection Systems

    DTIC Science & Technology

    2015-03-26

    7 VRT Vulnerability Research Team...and the Talos (formerly the Vulnerability Research Team ( VRT )) [7] 7 ruleset libraries are the two leading rulesets in use. Both libraries offer paid...rule sets to load for the signature-based IDS. Snort is selected as the IDS engine using the “ VRT and ET No/GPL” rule set. The total rule count in the

  18. THE IMPACT OF KINSHIP NETWORKS ON OLD-AGE VULNERABILITY IN INDONESIA

    PubMed Central

    Schröder-Butterfill, Elisabeth

    2007-01-01

    SUMMARY This article examines the problem of care provision for elderly people in Java, a contemporary developing society characterised by lack of formal welfare services, nuclear family organisation and high levels of childlessness. A similar socio-demographic, cultural and economic regime existed in historical Northwest Europe, where it has been seen as having contributed to the early emergence of community based old-age care and low involvement of wider kin networks. Here the role of kin in providing old-age care in a nuclear family system is re-examined by drawing on longitudinal data of elderly people's life histories and support networks in a village in East Java. The central argument is that the identification of elders most vulnerable to a lack of care and support in old age requires understanding the nature and functioning of kin networks over time. The paper discusses three key aspects of networks—network membership, exchanges within networks and network dynamics—and arrives at a characterisation of different kin networks on the basis of size, composition, location and social status. By focusing on the effects of a specific crisis, namely the loss of a wife, on care outcomes in old age, it is possible to determine what kinds of kin networks are best able to adjust to a sudden change in older people's circumstances and protect them from declines in welfare. This reveals the importance, especially for childless elderly people, of extended, heterogeneous and well-connected kin networks. PMID:23750056

  19. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    NASA Astrophysics Data System (ADS)

    Michele, Mangiameli; Giuseppe, Mussumeci

    2015-12-01

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks..

  20. Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers

    DTIC Science & Technology

    2017-12-01

    PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA

  1. Mathematical Approaches to WMD Defense and Vulnerability Assessments of Dynamic Networks

    DTIC Science & Technology

    2016-07-01

    the last decade, and now tends to focus on a system -wide integration of fortification resources, strategically deployed to...create a robust system of networks. Given the presence of various networks, this goal seeks to determine which edges should be constructed to...controlling all aspects of his actions, with full knowledge of the system , and with the ability to jointly utilize all of

  2. Livelihood Vulnerability Approach to Assess Climate Change Impacts to Mixed Agro-Livestock Smallholders Around the Gandaki River Basin of Nepal

    NASA Astrophysics Data System (ADS)

    Panthi, J., Sr.

    2014-12-01

    Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.

  3. Faculty Social Networking Interactions: Using Social Domain Theory to Assess Student Views

    ERIC Educational Resources Information Center

    Nemetz, Patricia L.

    2012-01-01

    As educators consider using social networking sites, like Facebook, for educational innovations, they must be aware of possible vulnerabilities associated with the blurring of social and professional boundaries. This research uses social domain theory to examine how students rate the appropriateness of various faculty postings, behaviors, and…

  4. 77 FR 38467 - Special Conditions: Gulfstream Aerospace LP (GALP), Model Gulfstream G280 Airplane; Isolation or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-28

    ... network security vulnerabilities and increased risks potentially resulting in unsafe conditions for the... Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized... connectivity of the passenger service computer systems to the airplane critical systems and data networks. The...

  5. Health vulnerabilities in adolescence: socioeconomic conditions, social networks, drugs and violence.

    PubMed

    dos Reis, Dener Carlos; de Almeida, Thiara Amanda Corrêa; Miranda, Mariane Mendes; Alves, Rodrigo Henrique; Madeira, Anézia Moreira Faria

    2013-01-01

    to analyze the health vulnerabilities in adolescence associated with socioeconomic conditions, social networks, drugs and violence from the perspective of students. cross-sectional study with 678 students between 14-15 years old in Contagem, Brazil. A self-administered questionnaire divided into modules by subject was used. Quantitative, descriptive and stratified analyses were performed by sex. high percentage of adolescents (40.4%) were beneficiaries of Government financial support called "Bolsa Família" and 14.6% had a job, 57.1% and 23.6% had tried alcohol and tobacco, respectively. We identified 15% of aggression and 26.7% of bullying. The majority informed they never/rarely talk to parents about the daily difficulties (64.5%) and 22% reported insomnia and/or feelings of loneliness. the results indicated that there is a need to intensify educational activities that seek to develop cognitive, affective and social skills aimed at improving the way adolescents face the vulnerabilities, in these activities, nursing has a fundamental role.

  6. An Analysis of Automated Solutions for the Certification and Accreditation of Navy Medicine Information Assets

    DTIC Science & Technology

    2005-09-01

    discovery of network security threats and vulnerabilities will be done by doing penetration testing during the C&A process. This can be done on a...2.1.1; Appendix E, J COBR -1 Protection of Backup and Restoration Assets Availability 1.3.1; 2.1.3; 2.1.7; 3.1; 4.3; Appendix J, M CODB-2 Data... discovery , inventory, scanning and loading of C&A information in its central database, (2) automatic generation of the SRTM , (3) automatic generation

  7. A probabilistic analysis of electrical equipment vulnerability to carbon fibers

    NASA Technical Reports Server (NTRS)

    Elber, W.

    1980-01-01

    The statistical problems of airborne carbon fibers falling onto electrical circuits were idealized and analyzed. The probability of making contact between randomly oriented finite length fibers and sets of parallel conductors with various spacings and lengths was developed theoretically. The probability of multiple fibers joining to bridge a single gap between conductors, or forming continuous networks is included. From these theoretical considerations, practical statistical analyses to assess the likelihood of causing electrical malfunctions was produced. The statistics obtained were confirmed by comparison with results of controlled experiments.

  8. Collective proposal of Contingency Plan as an alternative for management risks to socioenvironmental disasters within Network Management Risk of Córrego Dantas (REGER-CD), Nova Friburgo, State of Rio de Janeiro, Brazil

    NASA Astrophysics Data System (ADS)

    Freitas, Leonardo; Luiza Coelho Netto, Ana

    2017-04-01

    An extreme rainfall event took place in the Mountainous Region of the state of Rio de Janeiro in January 2011, causing a catastrophic landslide that resulted in more than 900 deaths and 350 people disappearances. Precipitation events associated with landslides are common in this region and climate change tends to increase the frequency of intense rains and, consequently, landslides. At the same time, the vulnerability of communities has increased as a result of disorderly urban growth. Despite that, before 2011 communities and public power were not prepared to disaster management..After the 2011 event, public authorities try to established policies to reduce these vulnerabilities. One of the communities where the government acted was Córrego Dantas. However, the actions in this place were carried out in a top-down model, without discussion with population. As a consequence, the performance of public power has amplified social vulnerabilities. Highlight for the truculent removal of residents; resettlement in geographically isolated housing complexes; and the establishment of urbanization policies that go against the interests of the residents. The construction of the Córrego d'Aantas Disaster Risk Management Network (REGER-CD), including residents of affected communities, researchers, NGO members and representatives of the public power, is one way to respond these questions. Within this network, the construction of a proposal for a collective contingency plan, articulated with the municipal contingency plan, is generating residents' empowerment, greater adaptation to risks and reducing the vulnerability of Disasters and mass movements

  9. Multilayered complex network datasets for three supply chain network archetypes on an urban road grid.

    PubMed

    Viljoen, Nadia M; Joubert, Johan W

    2018-02-01

    This article presents the multilayered complex network formulation for three different supply chain network archetypes on an urban road grid and describes how 500 instances were randomly generated for each archetype. Both the supply chain network layer and the urban road network layer are directed unweighted networks. The shortest path set is calculated for each of the 1 500 experimental instances. The datasets are used to empirically explore the impact that the supply chain's dependence on the transport network has on its vulnerability in Viljoen and Joubert (2017) [1]. The datasets are publicly available on Mendeley (Joubert and Viljoen, 2017) [2].

  10. Food Price Volatility and Decadal Climate Variability

    NASA Astrophysics Data System (ADS)

    Brown, M. E.

    2013-12-01

    The agriculture system is under pressure to increase production every year as global population expands and more people move from a diet mostly made up of grains, to one with more meat, dairy and processed foods. Weather shocks and large changes in international commodity prices in the last decade have increased pressure on local food prices. This paper will review several studies that link climate variability as measured with satellite remote sensing to food price dynamics in 36 developing countries where local monthly food price data is available. The focus of the research is to understand how weather and climate, as measured by variations in the growing season using satellite remote sensing, has affected agricultural production, food prices and access to food in agricultural societies. Economies are vulnerable to extreme weather at multiple levels. Subsistence small holders who hold livestock and consume much of the food they produce are vulnerable to food production variability. The broader society, however, is also vulnerable to extreme weather because of the secondary effects on market functioning, resource availability, and large-scale impacts on employment in trading, trucking and wage labor that are caused by weather-related shocks. Food price variability captures many of these broad impacts and can be used to diagnose weather-related vulnerability across multiple sectors. The paper will trace these connections using market-level data and analysis. The context of the analysis is the humanitarian aid community, using the guidance of the USAID Famine Early Warning Systems Network and the United Nation's World Food Program in their response to food security crises. These organizations have worked over the past three decades to provide baseline information on food production through satellite remote sensing data and agricultural yield models, as well as assessments of food access through a food price database. Econometric models and spatial analysis are used to describe the connection between shocks and food prices, and to demonstrate the importance of these metrics in overall outcomes in food-insecure communities.

  11. Assessment of the Effects of Endocrine Disrupting Compounds on the Development of Vertebrate Neural Network Function Using Multi-electrode Arrays.

    PubMed

    Sanchez, Karla R; Mersha, Mahlet D; Dhillon, Harbinder S; Temburni, Murali K

    2018-04-26

    Bis-phenols, such as bis-phenol A (BPA) and bis-phenol-S (BPS), are polymerizing agents widely used in the production of plastics and numerous everyday products. They are classified as endocrine disrupting compounds (EDC) with estradiol-like properties. Long-term exposure to EDCs, even at low doses, has been linked with various health defects including cancer, behavioral disorders, and infertility, with greater vulnerability during early developmental periods. To study the effects of BPA on the development of neuronal function, we used an in vitro neuronal network derived from the early chick embryonic brain as a model. We found that exposure to BPA affected the development of network activity, specifically spiking activity and synchronization. A change in network activity is the crucial link between the molecular target of a drug or compound and its effect on behavioral outcome. Multi-electrode arrays are increasingly becoming useful tools to study the effects of drugs on network activity in vitro. There are several systems available in the market and, although there are variations in the number of electrodes, the type and quality of the electrode array and the analysis software, the basic underlying principles, and the data obtained is the same across the different systems. Although currently limited to analysis of two-dimensional in vitro cultures, these MEA systems are being improved to enable in vivo network activity in brain slices. Here, we provide a detailed protocol for embryonic exposure and recording neuronal network activity and synchrony, along with representative results.

  12. Dynamic decision-making for reliability and maintenance analysis of manufacturing systems based on failure effects

    NASA Astrophysics Data System (ADS)

    Zhang, Ding; Zhang, Yingjie

    2017-09-01

    A framework for reliability and maintenance analysis of job shop manufacturing systems is proposed in this paper. An efficient preventive maintenance (PM) policy in terms of failure effects analysis (FEA) is proposed. Subsequently, reliability evaluation and component importance measure based on FEA are performed under the PM policy. A job shop manufacturing system is applied to validate the reliability evaluation and dynamic maintenance policy. Obtained results are compared with existed methods and the effectiveness is validated. Some vague understandings for issues such as network modelling, vulnerabilities identification, the evaluation criteria of repairable systems, as well as PM policy during manufacturing system reliability analysis are elaborated. This framework can help for reliability optimisation and rational maintenance resources allocation of job shop manufacturing systems.

  13. A concept analysis of women's vulnerability during pregnancy, birth and the postnatal period.

    PubMed

    Briscoe, Lesley; Lavender, Tina; McGowan, Linda

    2016-10-01

    To report an analysis of the concept of vulnerability associated with pregnancy, birth and the postnatal period. The concept of vulnerability during childbirth is complex and the term, 'to be vulnerable' frequently attains a vague application. Analysis about vulnerability is needed to guide policy, practice, education and research. Clarity around the concept has the potential to improve outcomes for women. Concept analysis. Searches were conducted in CINAHL, EMBASE, PubMed, Psychinfo, MEDLINE, MIDIRS and ASSIA and limited to between January 2000 - June 2014. Data were collected over 12 months during 2014. This concept analysis drew on Morse's qualitative methods. Vulnerability during pregnancy, birth and the postnatal period can be defined by three main attributes: (a) Threat; (b) Barrier; and (c) Repair. Key attributes have the potential to influence outcome for women. Inseparable sub-attributes such as mother and baby attachment, the woman's free will and choice added a level of complexity about the concept. This concept analysis has clarified how the term vulnerability is currently understood and used in relation to pregnancy, birth and the postnatal period. Vulnerability should be viewed as a complex phenomenon rather than a singular concept. A 'vulnerability journey plan' has the potential to identify how reparative interventions may develop the woman's capacity for resilience and influence the degree of vulnerability experienced. Methodology based around complex theory should be explored in future work about vulnerability. © 2016 John Wiley & Sons Ltd.

  14. Regional prioritisation of flood risk in mountainous areas

    NASA Astrophysics Data System (ADS)

    Rogelis, M. C.; Werner, M.; Obregón, N.; Wright, G.

    2015-07-01

    A regional analysis of flood risk was carried out in the mountainous area surrounding the city of Bogotá (Colombia). Vulnerability at regional level was assessed on the basis of a principal component analysis carried out with variables recognised in literature to contribute to vulnerability; using watersheds as the unit of analysis. The area exposed was obtained from a simplified flood analysis at regional level to provide a mask where vulnerability variables were extracted. The vulnerability indicator obtained from the principal component analysis was combined with an existing susceptibility indicator, thus providing an index that allows the watersheds to be prioritised in support of flood risk management at regional level. Results show that the components of vulnerability can be expressed in terms of four constituent indicators; socio-economic fragility, which is composed of demography and lack of well-being; lack of resilience, which is composed of education, preparedness and response capacity, rescue capacity, social cohesion and participation; and physical exposure is composed of exposed infrastructure and exposed population. A sensitivity analysis shows that the classification of vulnerability is robust for watersheds with low and high values of the vulnerability indicator, while some watersheds with intermediate values of the indicator are sensitive to shifting between medium and high vulnerability. The complex interaction between vulnerability and hazard is evidenced in the case study. Environmental degradation in vulnerable watersheds shows the influence that vulnerability exerts on hazard and vice versa, thus establishing a cycle that builds up risk conditions.

  15. A new multi-disciplinary model for the assessment and reduction of volcanic risk: the example of the island of Vulcano, Italy

    NASA Astrophysics Data System (ADS)

    Simicevic, Aleksandra; Bonadonna, Costanza; di Traglia, Federico; Rosi, Mauro

    2010-05-01

    Volcanic eruptions are accompanied by numerous hazards which pose short- and long-term threats to people and property. Recent experiences have shown that successful responses to hazard events correlate strongly with the degree to which proactive policies of risk reduction are already in place before an eruption occurs. Effective proactive risk-reduction strategies require contributions from numerous disciplines. A volcanic eruption is not a hazard, per se, but rather an event capable of producing a variety of hazards (e.g. earthquakes, pyroclastic density currents, lava flows, tephra fall, lahars, landslides, gas release, and tsunamis) that can affect the built environment in a variety of ways, over different time scales and with different degrees of intensity. Our proposed model for the assessment and mitigation of exposure-based volcanic risk is mainly based on the compilation of three types of maps: hazard maps, hazard-specific vulnerability maps and exposure-based risk maps. Hazard maps identify the spatial distribution of individual volcanic hazard and it includes both event analysis and impact analysis. Hazard-specific vulnerability maps represent the systematic evaluation of physical vulnerability of the built environment to a range of volcanic phenomena, i.e. spatial distribution of buildings vulnerable to a given hazard based on the analysis of selected building elements. Buildings are classified on the basis of their major components that are relevant for different volcanic hazards, their strength, their construction materials and are defined taking into account the potential damage that each group of building elements (e.g. walls, roof, load-bearing structure) will suffer under a volcanic hazard. All those factors are enumerated in a checklist and are used for the building survey. Hazard-specific vulnerability maps are then overlapped with hazard maps in order to compile exposure-based risk maps and so quantify the potential damage. Such quantification is the starting point of the identification of suitable mitigation measures which will be analyzed through a cost-benefit analysis to assess their financial feasibility. Information about public networks is also recorded in order to give an overall idea of the built environment condition of the island. The vulnerability assessment of the technical systems describes the potential damages that could stress systems like electricity supply, water distribution, communication networks or transport systems. These damages can also be described as function disruption of the system. The important aspect is not only the physical capacity of a system to resist, but also its capacity to continue functioning. The model will be tested on the island of Vulcano in southern Italy. Vulcano is characterized by clear signs of volcanic unrest and is the type locality for a deadly style of eruption. The main active system of Vulcano Island (La Fossa cone) is known to produce a variety of eruption styles and intensities, each posing their own hazards and threats. Six different hazard scenarios have been identified based on a detailed stratigraphic work. The urbanization on Vulcano took place in the 1980s with no real planning and its population mostly subsists on tourism. Our preliminary results show that Vulcano is not characterized by a great variability of architectural typologies and construction materials. Three main types of buildings are present (masonry with concrete frame, masonry with manufactured stone units, masonry with hollow clay bricks) and no statistically significant trends were found between physical and morphological characteristics. The recent signs of volcanic unrest combined with a complex vulnerability of the island due to an uncontrolled urban development and a significant seasonal variation of the exposed population in summer months result in a high volcanic risk. As a result, Vulcano represents the ideal environment to test a multi-hazard based risk model and to study the transition between micro (building) and macro (urban environment) scale of analysis, which is still an unexplored field in the study of volcanic risk. Different levels of vulnerability need to be analyzed in order to increase the level of preparedness, plan a potential evacuation, manage a potential volcanic crisis and assess the best mitigation measures to put in place and reduce the volcanic risk.

  16. U.K. Foot and Mouth Disease: A Systemic Risk Assessment of Existing Controls.

    PubMed

    Delgado, João; Pollard, Simon; Pearn, Kerry; Snary, Emma L; Black, Edgar; Prpich, George; Longhurst, Phil

    2017-09-01

    This article details a systemic analysis of the controls in place and possible interventions available to further reduce the risk of a foot and mouth disease (FMD) outbreak in the United Kingdom. Using a research-based network analysis tool, we identify vulnerabilities within the multibarrier control system and their corresponding critical control points (CCPs). CCPs represent opportunities for active intervention that produce the greatest improvement to United Kingdom's resilience to future FMD outbreaks. Using an adapted 'features, events, and processes' (FEPs) methodology and network analysis, our results suggest that movements of animals and goods associated with legal activities significantly influence the system's behavior due to their higher frequency and ability to combine and create scenarios of exposure similar in origin to the U.K. FMD outbreaks of 1967/8 and 2001. The systemic risk assessment highlights areas outside of disease control that are relevant to disease spread. Further, it proves to be a powerful tool for demonstrating the need for implementing disease controls that have not previously been part of the system. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  17. Architecture and Methods for Substation SCADA Cybersecurity: Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy

    There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less

  18. SSL/TLS Vulnerability Detection Using Black Box Approach

    NASA Astrophysics Data System (ADS)

    Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.

    2018-03-01

    Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.

  19. Propagation of economic shocks in input-output networks: A cross-country analysis

    NASA Astrophysics Data System (ADS)

    Contreras, Martha G. Alatriste; Fagiolo, Giorgio

    2014-12-01

    This paper investigates how economic shocks propagate and amplify through the input-output network connecting industrial sectors in developed economies. We study alternative models of diffusion on networks and we calibrate them using input-output data on real-world inter-sectoral dependencies for several European countries before the Great Depression. We show that the impact of economic shocks strongly depends on the nature of the shock and country size. Shocks that impact on final demand without changing production and the technological relationships between sectors have on average a large but very homogeneous impact on the economy. Conversely, when shocks change also the magnitudes of input-output across-sector interdependencies (and possibly sector production), the economy is subject to predominantly large but more heterogeneous avalanche sizes. In this case, we also find that (i) the more a sector is globally central in the country network, the larger its impact; (ii) the largest European countries, such as those constituting the core of the European Union's economy, typically experience the largest avalanches, signaling their intrinsic higher vulnerability to economic shocks.

  20. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    PubMed

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  1. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

    PubMed Central

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-01-01

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417

  2. Regional expression of the MAPT gene is associated with loss of hubs in brain networks and cognitive impairment in Parkinson disease and progressive supranuclear palsy.

    PubMed

    Rittman, Timothy; Rubinov, Mikail; Vértes, Petra E; Patel, Ameera X; Ginestet, Cedric E; Ghosh, Boyd C P; Barker, Roger A; Spillantini, Maria Grazia; Bullmore, Edward T; Rowe, James B

    2016-12-01

    Abnormalities of tau protein are central to the pathogenesis of progressive supranuclear palsy, whereas haplotype variation of the tau gene MAPT influences the risk of Parkinson disease and Parkinson's disease dementia. We assessed whether regional MAPT expression might be associated with selective vulnerability of global brain networks to neurodegenerative pathology. Using task-free functional magnetic resonance imaging in progressive supranuclear palsy, Parkinson disease, and healthy subjects (n = 128), we examined functional brain networks and measured the connection strength between 471 gray matter regions. We obtained MAPT and SNCA microarray expression data in healthy subjects from the Allen brain atlas. Regional connectivity varied according to the normal expression of MAPT. The regional expression of MAPT correlated with the proportionate loss of regional connectivity in Parkinson's disease. Executive cognition was impaired in proportion to the loss of hub connectivity. These effects were not seen with SNCA, suggesting that alpha-synuclein pathology is not mediated through global network properties. The results establish a link between regional MAPT expression and selective vulnerability of functional brain networks to neurodegeneration. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  3. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  4. Perturbation of the mutated EGFR interactome identifies vulnerabilities and resistance mechanisms.

    PubMed

    Li, Jiannong; Bennett, Keiryn; Stukalov, Alexey; Fang, Bin; Zhang, Guolin; Yoshida, Takeshi; Okamoto, Isamu; Kim, Jae-Young; Song, Lanxi; Bai, Yun; Qian, Xiaoning; Rawal, Bhupendra; Schell, Michael; Grebien, Florian; Winter, Georg; Rix, Uwe; Eschrich, Steven; Colinge, Jacques; Koomen, John; Superti-Furga, Giulio; Haura, Eric B

    2013-11-05

    We hypothesized that elucidating the interactome of epidermal growth factor receptor (EGFR) forms that are mutated in lung cancer, via global analysis of protein-protein interactions, phosphorylation, and systematically perturbing the ensuing network nodes, should offer a new, more systems-level perspective of the molecular etiology. Here, we describe an EGFR interactome of 263 proteins and offer a 14-protein core network critical to the viability of multiple EGFR-mutated lung cancer cells. Cells with acquired resistance to EGFR tyrosine kinase inhibitors (TKIs) had differential dependence of the core network proteins based on the underlying molecular mechanisms of resistance. Of the 14 proteins, 9 are shown to be specifically associated with survival of EGFR-mutated lung cancer cell lines. This included EGFR, GRB2, MK12, SHC1, ARAF, CD11B, ARHG5, GLU2B, and CD11A. With the use of a drug network associated with the core network proteins, we identified two compounds, midostaurin and lestaurtinib, that could overcome drug resistance through direct EGFR inhibition when combined with erlotinib. Our results, enabled by interactome mapping, suggest new targets and combination therapies that could circumvent EGFR TKI resistance.

  5. Automated Software Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  6. Disrupted topology of the resting state structural connectome in middle-aged APOE ε4 carriers.

    PubMed

    Korthauer, L E; Zhan, L; Ajilore, O; Leow, A; Driscoll, I

    2018-05-24

    The apolipoprotein E (APOE) ε4 allele is the best characterized genetic risk factor for Alzheimer's disease to date. Older APOE ε4 carriers (aged 60 + years) are known to have disrupted structural and functional connectivity, but less is known about APOE-associated network integrity in middle age. The goal of this study was to characterize APOE-related differences in network topology in middle age, as disentangling the early effects of healthy versus pathological aging may aid early detection of Alzheimer's disease and inform treatments. We performed resting state functional magnetic resonance imaging (rs-fMRI) and diffusion tensor imaging (DTI) in healthy, cognitively normal, middle-aged adults (age 40-60; N = 76, 38 APOE ε4 carriers). Graph theoretical analysis was used to calculate local and global efficiency of 1) a whole brain rs-fMRI network; 2) a whole brain DTI network; and 3) the resting state structural connectome (rsSC), an integrated functional-structural network derived using functional-by-structural hierarchical (FSH) mapping. Our results indicated no APOE ε4-associated differences in network topology of the rs-fMRI or DTI networks alone. However, ε4 carriers had significantly lower global and local efficiency of the integrated rsSC compared to non-carriers. Furthermore, ε4 carriers were less resilient to targeted node failure of the rsSC, which mimics the neuropathological process of Alzheimer's disease. Collectively, these findings suggest that integrating multiple neuroimaging modalities and employing graph theoretical analysis may reveal network-level vulnerabilities that may serve as biomarkers of age-related cognitive decline in middle age, decades before the onset of overt cognitive impairment. Copyright © 2018. Published by Elsevier Inc.

  7. Always Wanted to Hack the Pentagon? DoD Says Bring It

    Science.gov Websites

    test and find vulnerabilities in the department's applications, websites and networks, he added Resolve/Foal Eagle 2010, a joint U.S. and South Korean command-post exercise with computer-based command-post exercise with computer-based simulations and field exercises. Cook said other networks

  8. Managing a User’s Vulnerability on a Social Networking Site

    DTIC Science & Technology

    2015-05-01

    aid not only the cyberbullying of teenagers but also the cyberstalking and cyberharassment of adults3. On a social networking site, an individual user...news/2011-07-23-facebook-stalker- sentenced_n.htm 3en.wikipedia.org/wiki/ Cyberbullying 1 posts and subsequent interactions. The owner of the site

  9. 75 FR 14429 - Agency Information Collection Activities; Submission for Office of Management and Budget Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... regular security audits and have been certified for operation. The CPSC observes all industry and Federal government best practices for network security. CPSC staff regularly analyzes its systems for vulnerabilities and malware, and monitor the network for real-time intrusion attempts. B. Estimated Burden The CPSC...

  10. Anomaly Detection Techniques for Ad Hoc Networks

    ERIC Educational Resources Information Center

    Cai, Chaoli

    2009-01-01

    Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…

  11. Blessed Oblivion? Knowledge and Metacognitive Accuracy in Online Social Networks

    ERIC Educational Resources Information Center

    Moll, Ricarda; Pieschl, Stephanie; Bromme, Rainer

    2015-01-01

    In order to reap the social gratifications of Online Social Networks (OSNs), users often disclose self-related information, making them potentially vulnerable to their online audiences. We give a brief overview of our theoretical ideas and empirical research about additional cognitive and metacognitive factors relevant for the perception of risk…

  12. Network Approach to Understanding Emotion Dynamics in Relation to Childhood Trauma and Genetic Liability to Psychopathology: Replication of a Prospective Experience Sampling Analysis

    PubMed Central

    Hasmi, Laila; Drukker, Marjan; Guloksuz, Sinan; Menne-Lothmann, Claudia; Decoster, Jeroen; van Winkel, Ruud; Collip, Dina; Delespaul, Philippe; De Hert, Marc; Derom, Catherine; Thiery, Evert; Jacobs, Nele; Rutten, Bart P. F.; Wichers, Marieke; van Os, Jim

    2017-01-01

    Background: The network analysis of intensive time series data collected using the Experience Sampling Method (ESM) may provide vital information in gaining insight into the link between emotion regulation and vulnerability to psychopathology. The aim of this study was to apply the network approach to investigate whether genetic liability (GL) to psychopathology and childhood trauma (CT) are associated with the network structure of the emotions “cheerful,” “insecure,” “relaxed,” “anxious,” “irritated,” and “down”—collected using the ESM method. Methods: Using data from a population-based sample of twin pairs and siblings (704 individuals), we examined whether momentary emotion network structures differed across strata of CT and GL. GL was determined empirically using the level of psychopathology in monozygotic and dizygotic co-twins. Network models were generated using multilevel time-lagged regression analysis and were compared across three strata (low, medium, and high) of CT and GL, respectively. Permutations were utilized to calculate p values and compare regressions coefficients, density, and centrality indices. Regression coefficients were presented as connections, while variables represented the nodes in the network. Results: In comparison to the low GL stratum, the high GL stratum had significantly denser overall (p = 0.018) and negative affect network density (p < 0.001). The medium GL stratum also showed a directionally similar (in-between high and low GL strata) but statistically inconclusive association with network density. In contrast to GL, the results of the CT analysis were less conclusive, with increased positive affect density (p = 0.021) and overall density (p = 0.042) in the high CT stratum compared to the medium CT stratum but not to the low CT stratum. The individual node comparisons across strata of GL and CT yielded only very few significant results, after adjusting for multiple testing. Conclusions: The present findings demonstrate that the network approach may have some value in understanding the relation between established risk factors for mental disorders (particularly GL) and the dynamic interplay between emotions. The present finding partially replicates an earlier analysis, suggesting it may be instructive to model negative emotional dynamics as a function of genetic influence. PMID:29163289

  13. Shock waves on complex networks

    NASA Astrophysics Data System (ADS)

    Mones, Enys; Araújo, Nuno A. M.; Vicsek, Tamás; Herrmann, Hans J.

    2014-05-01

    Power grids, road maps, and river streams are examples of infrastructural networks which are highly vulnerable to external perturbations. An abrupt local change of load (voltage, traffic density, or water level) might propagate in a cascading way and affect a significant fraction of the network. Almost discontinuous perturbations can be modeled by shock waves which can eventually interfere constructively and endanger the normal functionality of the infrastructure. We study their dynamics by solving the Burgers equation under random perturbations on several real and artificial directed graphs. Even for graphs with a narrow distribution of node properties (e.g., degree or betweenness), a steady state is reached exhibiting a heterogeneous load distribution, having a difference of one order of magnitude between the highest and average loads. Unexpectedly we find for the European power grid and for finite Watts-Strogatz networks a broad pronounced bimodal distribution for the loads. To identify the most vulnerable nodes, we introduce the concept of node-basin size, a purely topological property which we show to be strongly correlated to the average load of a node.

  14. Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat

    Several transportation network vulnerability models have been proposed. However, most only consider disruptions as a static snapshot in time and the impact on total travel time. These approaches cannot consider the time-varying nature of travel demand nor other undesirable outcomes that follow from transportation network disruptions. This paper proposes an algorithmic approach to assess the vulnerability of a transportation network that considers the time-varying demand with an open source dynamic transportation simulation tool. The open source nature of the tool allows us to systematically consider many disruption scenarios and quantitatively compare their relative criticality. This is far more efficient thanmore » traditional approaches which would require days or weeks of a transportation engineers time to manually set up, run, and assess these simulations. In addition to travel time, we also collect statistics on additional fuel consumed and the corresponding carbon dioxide emissions. Our approach, thus provides a more systematic approach that is both time-varying and can consider additional negative consequences of disruptions for decision makers to evaluate.« less

  15. A Framework for Programming and Budgeting for Cybersecurity

    DTIC Science & Technology

    2016-01-01

    environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol

  16. Survey of Malware Threats and Recommendations to Improve Cybersecurity for Industrial Control Systems Version 1.0

    DTIC Science & Technology

    2015-02-01

    not normally blocked by enterprise firewalls . • Some malware exploited zero-day vulnerabilities as well as attempted to exploit vulnerabilities for...servers, receiving updates, and exfiltrating data. Firewalls are routinely configured to block incoming connections while malware within a target...implemented with layers of technical security controls (e.g., ICS-aware firewalls ) to control network traffic and prevent the spread of malware . Intrusion

  17. Potential System Vulnerabilities of a Network Enabled Force

    DTIC Science & Technology

    2004-09-01

    of trust in information, loss of context and awareness of others’ needs and reduction of social cohesion . Science - (more specifically systems...and Technology Damaging Social Cohesion NCW champions the concept of dispersed forces as a means to generate effects through approaches other than...Mission Grouping Damaging Social Cohesion This is a slight variation on the vulnerability expressed in 3.9.6 above. If we have agility in mission

  18. Resistance Genes in Global Crop Breeding Networks.

    PubMed

    Garrett, K A; Andersen, K F; Asche, F; Bowden, R L; Forbes, G A; Kulakow, P A; Zhou, B

    2017-10-01

    Resistance genes are a major tool for managing crop diseases. The networks of crop breeders who exchange resistance genes and deploy them in varieties help to determine the global landscape of resistance and epidemics, an important system for maintaining food security. These networks function as a complex adaptive system, with associated strengths and vulnerabilities, and implications for policies to support resistance gene deployment strategies. Extensions of epidemic network analysis can be used to evaluate the multilayer agricultural networks that support and influence crop breeding networks. Here, we evaluate the general structure of crop breeding networks for cassava, potato, rice, and wheat. All four are clustered due to phytosanitary and intellectual property regulations, and linked through CGIAR hubs. Cassava networks primarily include public breeding groups, whereas others are more mixed. These systems must adapt to global change in climate and land use, the emergence of new diseases, and disruptive breeding technologies. Research priorities to support policy include how best to maintain both diversity and redundancy in the roles played by individual crop breeding groups (public versus private and global versus local), and how best to manage connectivity to optimize resistance gene deployment while avoiding risks to the useful life of resistance genes. [Formula: see text] Copyright © 2017 The Author(s). This is an open access article distributed under the CC BY 4.0 International license .

  19. Livelihood diversification in tropical coastal communities: a network-based approach to analyzing 'livelihood landscapes'.

    PubMed

    Cinner, Joshua E; Bodin, Orjan

    2010-08-11

    Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as 'livelihood landscapes'. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights into communities' dependencies and usages of natural resources, and shows how patterns of occupational interrelationships relate to socioeconomic development and population density. A key question for future analysis is how the reduction of household occupational diversity, but maintenance of community diversity we see with increasing socioeconomic development influences key aspects of societies' vulnerability to environmental change or disasters.

  20. Identifying security checkpoints locations to protect the major U.S. urban areas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cuellar-Hengartner, Leticia; Watkins, Daniel; Kubicek, Deborah A.

    Transit networks are integral to the economy and to society, but at the same time they could allow terrorists to transport weapons of mass destruction into any city. Road networks are especially vulnerable, because they lack natural checkpoints unlike air networks that have security measures in place at all major airports. One approach to mitigate this risk is ensuring that every road route passes through at least one security checkpoint. Using the Ford-Fulkerson maximum-flow algorithm, we generate a minimum set of checkpoint locations within a ring-shaped buffer area surrounding the 50 largest US urban areas. We study how the numbermore » of checkpoints changes as we increase the buffer width to perform a cost-benefit analysis and to identify groups of cities that behave similarly. The set of required checkpoints is surprisingly small (10-124) despite the hundreds of thousands of road arcs in those areas, making it feasible to protect all major cities.« less

  1. Availability: A Metric for Nucleic Acid Strand Displacement Systems

    PubMed Central

    2016-01-01

    DNA strand displacement systems have transformative potential in synthetic biology. While powerful examples have been reported in DNA nanotechnology, such systems are plagued by leakage, which limits network stability, sensitivity, and scalability. An approach to mitigate leakage in DNA nanotechnology, which is applicable to synthetic biology, is to introduce mismatches to complementary fuel sequences at key locations. However, this method overlooks nuances in the secondary structure of the fuel and substrate that impact the leakage reaction kinetics in strand displacement systems. In an effort to quantify the impact of secondary structure on leakage, we introduce the concepts of availability and mutual availability and demonstrate their utility for network analysis. Our approach exposes vulnerable locations on the substrate and quantifies the secondary structure of fuel strands. Using these concepts, a 4-fold reduction in leakage has been achieved. The result is a rational design process that efficiently suppresses leakage and provides new insight into dynamic nucleic acid networks. PMID:26875531

  2. Identifying security checkpoints locations to protect the major U.S. urban areas

    DOE PAGES

    Cuellar-Hengartner, Leticia; Watkins, Daniel; Kubicek, Deborah A.; ...

    2015-09-01

    Transit networks are integral to the economy and to society, but at the same time they could allow terrorists to transport weapons of mass destruction into any city. Road networks are especially vulnerable, because they lack natural checkpoints unlike air networks that have security measures in place at all major airports. One approach to mitigate this risk is ensuring that every road route passes through at least one security checkpoint. Using the Ford-Fulkerson maximum-flow algorithm, we generate a minimum set of checkpoint locations within a ring-shaped buffer area surrounding the 50 largest US urban areas. We study how the numbermore » of checkpoints changes as we increase the buffer width to perform a cost-benefit analysis and to identify groups of cities that behave similarly. The set of required checkpoints is surprisingly small (10-124) despite the hundreds of thousands of road arcs in those areas, making it feasible to protect all major cities.« less

  3. A more secure parallel keyed hash function based on chaotic neural network

    NASA Astrophysics Data System (ADS)

    Huang, Zhongquan

    2011-08-01

    Although various hash functions based on chaos or chaotic neural network were proposed, most of them can not work efficiently in parallel computing environment. Recently, an algorithm for parallel keyed hash function construction based on chaotic neural network was proposed [13]. However, there is a strict limitation in this scheme that its secret keys must be nonce numbers. In other words, if the keys are used more than once in this scheme, there will be some potential security flaw. In this paper, we analyze the cause of vulnerability of the original one in detail, and then propose the corresponding enhancement measures, which can remove the limitation on the secret keys. Theoretical analysis and computer simulation indicate that the modified hash function is more secure and practical than the original one. At the same time, it can keep the parallel merit and satisfy the other performance requirements of hash function, such as good statistical properties, high message and key sensitivity, and strong collision resistance, etc.

  4. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  5. Aberrant default-mode network-hippocampus connectivity after sad memory-recall in remitted-depression

    PubMed Central

    Mocking, Roel J T; van Wingen, Guido; Martens, Suzanne; Ruhé, Henricus G; Schene, Aart H

    2017-01-01

    Abstract Rumination and cognitive reactivity (dysfunctional cognitions after sad mood-induction) remain high in remitted Major Depressive Disorder (MDD) and can contribute to new episodes. These factors have been linked to increased fMRI resting-state functional-connectivity within the Default-Mode Network (DMN). It remains unclear whether (I) increased DMN-connectivity persists during MDD-remission, and (II) whether sad mood-induction differentially affects DMN-connectivity in remitted-MDD vs controls. Moreover, DMN-connectivity studies in remitted-MDD were previously confounded by antidepressant-use. Sixty-two MDD-patients remitted from ≥2 episodes, psychotropic-medication free, and 41 controls, participated in two 5-min neutral and sad mood-inductions by autobiographical-recall and neutral/sad music, each followed by 8-min resting-state fMRI-scanning. We identified DMN-components using Independent Component Analysis and entered subject- and sessions-specific components into a repeated measures analysis of variance. Connectivity-differences were extracted and correlated with baseline cognitive reactivity and rumination as measures of vulnerability for recurrence. After sad vs neutral mood-induction, controls, but not remitted-MDD, showed an increase in connectivity between the posterior-DMN and a cluster consisting mostly of the hippocampus (P = 0.006). Less posterior-DMN-hippocampal connectivity was associated with higher cognitive reactivity (r = −0.21, P = 0.046) and rumination (r = −0.27, P = 0.017). After recalling sad autobiographical-memories, aberrant posterior-DMN-hippocampal connectivity, associated with cognitive reactivity and rumination, remains a neural vulnerability in MDD-remission. PMID:28981917

  6. Aberrant default-mode network-hippocampus connectivity after sad memory-recall in remitted-depression.

    PubMed

    Figueroa, Caroline A; Mocking, Roel J T; van Wingen, Guido; Martens, Suzanne; Ruhé, Henricus G; Schene, Aart H

    2017-11-01

    Rumination and cognitive reactivity (dysfunctional cognitions after sad mood-induction) remain high in remitted Major Depressive Disorder (MDD) and can contribute to new episodes. These factors have been linked to increased fMRI resting-state functional-connectivity within the Default-Mode Network (DMN). It remains unclear whether (I) increased DMN-connectivity persists during MDD-remission, and (II) whether sad mood-induction differentially affects DMN-connectivity in remitted-MDD vs controls. Moreover, DMN-connectivity studies in remitted-MDD were previously confounded by antidepressant-use. Sixty-two MDD-patients remitted from ≥2 episodes, psychotropic-medication free, and 41 controls, participated in two 5-min neutral and sad mood-inductions by autobiographical-recall and neutral/sad music, each followed by 8-min resting-state fMRI-scanning. We identified DMN-components using Independent Component Analysis and entered subject- and sessions-specific components into a repeated measures analysis of variance. Connectivity-differences were extracted and correlated with baseline cognitive reactivity and rumination as measures of vulnerability for recurrence. After sad vs neutral mood-induction, controls, but not remitted-MDD, showed an increase in connectivity between the posterior-DMN and a cluster consisting mostly of the hippocampus (P = 0.006). Less posterior-DMN-hippocampal connectivity was associated with higher cognitive reactivity (r = -0.21, P = 0.046) and rumination (r = -0.27, P = 0.017). After recalling sad autobiographical-memories, aberrant posterior-DMN-hippocampal connectivity, associated with cognitive reactivity and rumination, remains a neural vulnerability in MDD-remission. © The Author (2017). Published by Oxford University Press.

  7. Atmospheric Environment Vulnerability Cause Analysis for the Beijing-Tianjin-Hebei Metropolitan Region

    PubMed Central

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-01-01

    Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management. PMID:29342852

  8. Atmospheric Environment Vulnerability Cause Analysis for the Beijing-Tianjin-Hebei Metropolitan Region.

    PubMed

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-01-13

    Assessing and quantifying atmospheric vulnerability is a key issue in urban environmental protection and management. This paper integrated the Analytical hierarchy process (AHP), fuzzy synthesis evaluation and Geographic Information System (GIS) spatial analysis into an Exposure-Sensitivity-Adaptive capacity (ESA) framework to quantitatively assess atmospheric environment vulnerability in the Beijing-Tianjin-Hebei (BTH) region with spatial and temporal comparisons. The elaboration of the relationships between atmospheric environment vulnerability and indices of exposure, sensitivity, and adaptive capacity supports enable analysis of the atmospheric environment vulnerability. Our findings indicate that the atmospheric environment vulnerability of 13 cities in the BTH region exhibits obvious spatial heterogeneity, which is caused by regional diversity in exposure, sensitivity, and adaptive capacity indices. The results of atmospheric environment vulnerability assessment and the cause analysis can provide guidance to pick out key control regions and recognize vulnerable indicators for study sites. The framework developed in this paper can also be replicated at different spatial and temporal scales using context-specific datasets to support environmental management.

  9. Nuclear pulse. II - Ensuring delivery of the doomsday signal

    NASA Astrophysics Data System (ADS)

    Broad, W. J.

    1981-06-01

    The ability of the communications systems on which U.S. strategic forces depend to survive the electromagnetic pulse (EMP) effects of a nuclear blast in the upper atmosphere is examined. It is shown that the Bell system telephone network, Autovon, on which much military communication presently depends, is especially vulnerable to EMP; while satellite and microwave communications networks are expected to be more resistant to attack. Satellites are, though, vulnerable to killer-satellite attack. Much promise is seen in the conversion of ground communications links to fiber-optic form, which is inherently highly resistant to EMP. A nuclear bomb detonated 200 miles above Nebraska would affect communications equipment throughout the contiguous U.S. with peak fields of 500,000 volts/meter.

  10. The Role of Intrinsic Brain Functional Connectivity in Vulnerability and Resilience to Bipolar Disorder.

    PubMed

    Doucet, Gaelle E; Bassett, Danielle S; Yao, Nailin; Glahn, David C; Frangou, Sophia

    2017-12-01

    Bipolar disorder is a heritable disorder characterized by mood dysregulation associated with brain functional dysconnectivity. Previous research has focused on the detection of risk- and disease-associated dysconnectivity in individuals with bipolar disorder and their first-degree relatives. The present study seeks to identify adaptive brain connectivity features associated with resilience, defined here as avoidance of illness or delayed illness onset in unaffected siblings of patients with bipolar disorder. Graph theoretical methods were used to examine global and regional brain network topology in head-motion-corrected resting-state functional MRI data acquired from 78 patients with bipolar disorder, 64 unaffected siblings, and 41 healthy volunteers. Global network properties were preserved in patients and their siblings while both groups showed reductions in the cohesiveness of the sensorimotor network. In the patient group, these sensorimotor network abnormalities were coupled with reduced integration of core default mode network regions in the ventromedial cortex and hippocampus. Conversely, integration of the default mode network was increased in the sibling group compared with both the patient group and the healthy volunteer group. The authors found that trait-related vulnerability to bipolar disorder was associated with reduced resting-state cohesiveness of the sensorimotor network in patients with bipolar disorder. However, integration of the default mode network emerged as a key feature differentiating disease expression and resilience between the patients and their siblings. This is indicative of the presence of neural mechanisms that may promote resilience, or at least delay illness onset.

  11. Collecting data to evaluate the effect of health policies on vulnerable populations.

    PubMed

    Bindman, A B; Grumbach, K; Keane, D; Lurie, N

    1993-02-01

    Public health policies often have disproportionate effects on the poor and other vulnerable groups. Standard survey techniques are often difficult to apply to these vulnerable populations, and many data bases systematically omit such individuals. The purpose of this paper is to review our experience in collecting primary survey data from public hospital, mentally ill, HIV-infected, and non-English-speaking patients. Important issues in conducting research on these populations include proper selection of subjects and comparison groups and difficulties involved in recruitment and enrollment of subjects. Maintaining longitudinal data on these populations is difficult and often requires tracking, secondary contacts, home visits and community outreach, and the use of organizations, institutions, and networks. Investigators must also pay careful attention to ethical issues involved in conducting research on vulnerable populations.

  12. The contribution of the Global Change Observatory Central Asia to seismic hazard and risk assessment in the Central Asian region

    NASA Astrophysics Data System (ADS)

    Parolai, S.; Bindi, D.; Haberland, C. A.; Pittore, M.; Pilz, M.; Rosenau, M.; Schurr, B.; Wieland, M.; Yuan, X.

    2012-12-01

    Central Asia has one of the world's highest levels of earthquake hazard, owing to its exceptionally high deformation rates. Moreover, vulnerability to natural disasters in general is increasing, due to rising populations and a growing dependence on complex lifelines and technology. Therefore, there is an urgent need to undertake seismic hazard and risk assessment in this region, while at the same time improving upon existing methodologies, including the consideration of temporal variability in the seismic hazard, and in structural and social vulnerability. Over the last few years, the German Research Center for Geosciences (GFZ), in collaboration with local partners, has initiated a number of scientific activities within the framework of the Global Change Observatory Central Asia (GCO-CA). The work is divided into projects with specific concerns: - The installation and maintenance of the Central-Asian Real-time Earthquake MOnitoring Network (CAREMON) and the setup of a permanent wireless mesh network for structural health monitoring in Bishkek. - The TIPAGE and TIPTIMON projects focus on the geodynamics of the Tien-Shan, Pamir and Hindu Kush region, the deepest and most active intra-continental subduction zone in the world. The work covers time scales from millions of years to short-term snapshots based on geophysical measurements of seismotectonic activity and of the physical properties of the crust and upper mantle, as well as their coupling with other surface processes (e.g., landslides). - Existing risk analysis methods assume time-independent earthquake hazard and risk, although temporal changes are likely to occur due to, for example, co- and post-seismic changes in the regional stress field. We therefore aim to develop systematic time-dependent hazard and risk analysis methods in order to undertake the temporal quantification of earthquake activity (PROGRESS). - To improve seismic hazard assessment for better loss estimation, detailed site effects studies are necessary. Temporary seismic networks have been installed in several Central Asian cities (Bishkek and Karakol, Kyrgyzstan; Dushanbe, Tajikistan; Tashkent, Uzbekistan) within the framework of the Earthquake Model Central Asia (EMCA), a regional program of the Global Earthquake Model (GEM). The empirically estimated site effects have already helped to improve real-time risk scenarios for Bishkek and will be applied to other major cities. - A crucial requirement for disaster risk reduction involves the analysis of the vulnerability of existing building inventories. Whereas traditional approaches are very time- and cost-consuming, and even impossible given the high rate of urbanization in Central Asian capitals, our integrated approach is based on satellite remote sensing and ground-based omni-directional imaging, providing building inventories and thus structural vulnerability over large areas (EMCA, GEM-IDCT). All mentioned activities are carried out within the framework of cooperation between GFZ and regional national institutes, in particular the Central Asian Institute for Applied Geosciences. Altogether, this comprehensive and long-term risk analyses and research program will lead to a better understanding of the coupling of endogene and exogene processes and the identification of their impact on society.

  13. Associations between social vulnerabilities and dietary patterns in European children: the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS (IDEFICS) study.

    PubMed

    Iguacel, Isabel; Fernández-Alvira, Juan M; Bammann, Karin; De Clercq, Bart; Eiben, Gabriele; Gwozdz, Wencke; Molnar, Dénes; Pala, Valeria; Papoutsou, Stalo; Russo, Paola; Veidebaum, Toomas; Wolters, Maike; Börnhorst, Claudia; Moreno, Luis A

    2016-10-01

    Socio-economic inequalities in childhood can determine dietary patterns, and therefore future health. This study aimed to explore associations between social vulnerabilities and dietary patterns assessed at two time points, and to investigate the association between accumulation of vulnerabilities and dietary patterns. A total of 9301 children aged 2-9 years participated at baseline and 2-year follow-up examinations of the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS study. In all, three dietary patterns were identified at baseline and follow-up by applying the K-means clustering algorithm based on a higher frequency of consumption of snacks and fast food (processed), sweet foods and drinks (sweet), and fruits and vegetables (healthy). Vulnerable groups were defined at baseline as follows: children whose parents lacked a social network, children from single-parent families, children of migrant origin and children with unemployed parents. Multinomial mixed models were used to assess the associations between social vulnerabilities and children's dietary patterns at baseline and follow-up. Children whose parents lacked a social network (OR 1·31; 99 % CI 1·01, 1·70) and migrants (OR 1·45; 99 % CI 1·15, 1·83) were more likely to be in the processed cluster at baseline and follow-up. Children whose parents were homemakers (OR 0·74; 99 % CI 0·60, 0·92) were less likely to be in the processed cluster at baseline. A higher number of vulnerabilities was associated with a higher probability of children being in the processed cluster (OR 1·78; 99 % CI 1·21, 2·62). Therefore, special attention should be paid to children of vulnerable groups as they present unhealthier dietary patterns.

  14. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    PubMed

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-10-23

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  15. A new Geo-Information Architecture for Risk Management in the Alps

    NASA Astrophysics Data System (ADS)

    Baruffini, Mi.; Thuering, M.

    2009-04-01

    During the last decades land-use increased significantly in the Swiss (and European) mountain regions. Due to the scarceness of areas suitable for development, anthropic activities were extended into areas prone to natural hazards such as avalanches, debris flows and rockfalls (Smith 2001). Furthermore, the transalpine transport system necessity to develop effective links in an important area collides with the need to ensure the safety of travelers and the health of the population. Consequently, an increase in losses due to hazards can be observed. To mitigate these associated losses, both traditional protective measures and land-use planning policies are to be developed and implemented to optimize future investments. Efficient protection alternatives can be obtained considering the concept of integral risk management. Risk analysis, as the central part of risk management, has become gradually a generally accepted approach for the assessment of current and future scenarios (Loat & Zimmermann 2004). The procedure aims at risk reduction which can be reached by conventional mitigation on one hand and the implementation of land-use planning on the other hand: a combination of active and passive mitigation measures is applied to prevent damage to buildings, people and infrastructures. As part of the Swiss National Science Foundation Project 54 "Evaluation of the optimal resilience for vulnerable infrastructure networks - An interdisciplinary pilot study on the transalpine transportation corridors" we study the vulnerability of infrastructures due to natural hazards. The project aims to study various natural hazards (and later, even man-made) and to obtain an evaluation of the resilience according to an interdisciplinary approach, considering the possible damage by means of risk criteria and pointing out the feasibility of conceivable measures to reduce potential damage. The project consists of a geoscientific part and an application. The fist part consists in studying the dangers (natural) and related risks in terms of infrastructure vulnerability. The application considers different types of danger (logically intersected with the transport infrastructure) and compares them with fixed values to obtain a so-called deficit. As framework we adopt The Swiss system for risk analysis of gravitational natural hazards (BUWAL 1999). In this way the project develops a methodology that makes possible a risk analysis aiming to optimize the infrastructure vulnerability and therefore allows to obtain a model designed to optimize the functionality of the network infrastructure. A simulation environment, RiskBox, is developed within the open-source GIS environment GRASS (Geographic Resources Analysis Support System) and a database (PostgreSQL) in order to manage a infrastructure data catalog. The targeted simulation environment includes the elements that identify the consecutive steps of risk analysis: hazard - vulnerability - risk. The initial results of the experimental case study show how useful a GIS-based system, which identify the risk of any single vulnerable element in the corridor and to assess the risk to the global system on the basis of priorities of the actors involved, can be for effective and efficient disaster response management, as explained in (ARMONIA Project 2007). In our work we wanted to highlight the complexity of the risk analysis methodology, difficulty that is amplified by many peculiarities in the mountain areas. In particular, the illustrative performed process can give an overview of the interests and the need to act to reduce vulnerability and the hazardous nature of the Gotthard corridor. We present the concept and current state of development of our project and our application to the testbed, the Alps-crossing corridor of St. Gotthard. REFERENCES ARMONIA Project 2007: Land use plans in Risky areas fro Unwise to Wise Practices - Materials 2nd conference. Politecnico di Milano. BUWAL 1999: Risikoanalyse bei gravitativen Naturgefahren - Methode, Fallbeispiele und Daten (Risk analyses for gravitational natural hazards). Bundesamt für Umwelt, Wald und Landschaft (BUWAL). Umwelt-Materialen Nr. 107, 1-244. Loat, R. & Zimmermann, M. 2004 : La gestion des risques en Suisse (Risk Management in Switzerland). In: Veyret, Y., Garry, G., Meschinet de Richemont, N. & Armand Colin (eds) 2002: Colloque Arche de la Défense 22-24 octobre 2002, dans Risques naturels et aménagement en Europe, 108-120. Smith, K. 2001: Environmental hazards. Assessing the risk and reducing disaster. Third edition. London

  16. Guaranteeing Spoof-Resilient Multi-Robot Networks

    DTIC Science & Technology

    2015-05-12

    particularly challenging attack on this assumption is the so-called “Sybil attack.” In a Sybil attack a malicious agent can generate (or spoof) a large...cybersecurity in general multi-node networks (e.g. a wired LAN), the same is not true for multi- robot networks [14, 28], leaving them largely vulnerable...key passing or cryptographic authen- tication is difficult to maintain due to the highly dynamic and distributed nature of multi-robot teams where

  17. Analysis and forecast of railway coal transportation volume based on BP neural network combined forecasting model

    NASA Astrophysics Data System (ADS)

    Xu, Yongbin; Xie, Haihong; Wu, Liuyi

    2018-05-01

    The share of coal transportation in the total railway freight volume is about 50%. As is widely acknowledged, coal industry is vulnerable to the economic situation and national policies. Coal transportation volume fluctuates significantly under the new economic normal. Grasp the overall development trend of railway coal transportation market, have important reference and guidance significance to the railway and coal industry decision-making. By analyzing the economic indicators and policy implications, this paper expounds the trend of the coal transportation volume, and further combines the economic indicators with the high correlation with the coal transportation volume with the traditional traffic prediction model to establish a combined forecasting model based on the back propagation neural network. The error of the prediction results is tested, which proves that the method has higher accuracy and has practical application.

  18. Towards a Quantitative Framework for Evaluating Vulnerability of Drinking Water Wells to Contamination from Unconventional Oil & Gas Development

    NASA Astrophysics Data System (ADS)

    Soriano, M., Jr.; Deziel, N. C.; Saiers, J. E.

    2017-12-01

    The rapid expansion of unconventional oil and gas (UO&G) production, made possible by advances in hydraulic fracturing (fracking), has triggered concerns over risks this extraction poses to water resources and public health. Concerns are particularly acute within communities that host UO&G development and rely heavily on shallow aquifers as sources of drinking water. This research aims to develop a quantitative framework to evaluate the vulnerability of drinking water wells to contamination from UO&G activities. The concept of well vulnerability is explored through application of backwards travel time probability modeling to estimate the likelihood that capture zones of drinking water wells circumscribe source locations of UO&G contamination. Sources of UO&G contamination considered in this analysis include gas well pads and documented sites of UO&G wastewater and chemical spills. The modeling approach is illustrated for a portion of Susquehanna County, Pennsylvania, where more than one thousand shale gas wells have been completed since 2005. Data from a network of eight multi-level groundwater monitoring wells installed in the study site in 2015 are used to evaluate the model. The well vulnerability concept is proposed as a physically based quantitative tool for policy-makers dealing with the management of contamination risks of drinking water wells. In particular, the model can be used to identify adequate setback distances of UO&G activities from drinking water wells and other critical receptors.

  19. A Bayesian Network to Predict Barrier Island Geomorphologic Characteristics

    NASA Astrophysics Data System (ADS)

    Gutierrez, B.; Plant, N. G.; Thieler, E. R.; Turecek, A.; Stippa, S.

    2014-12-01

    Understanding how barrier islands along the Atlantic and Gulf coasts of the United States respond to storms and sea-level rise is an important management concern. Although these threats are well recognized, quantifying the integrated vulnerability is challenging due to the range of time and space scalesover which these processes act. Developing datasets and methods to identify the physical vulnerabilities of coastal environments due to storms and sea-level rise thus is an important scientific focus that supports land management decision making. Here we employ a Bayesian Network (BN) to model the interactions between geomorphic variables sampled from existing datasets that capture both storm-and sea-level rise related coastal evolution. The BN provides a means of estimating probabilities of changes in specific geomorphic characteristics such as foredune crest height, beach width, beach height, given knowledge of barrier island width, maximum barrier island elevation, distance from an inlet, the presence of anthropogenic modifications, and long-term shoreline change rates, which we assume to be directly related to sea-level rise. We evaluate BN skill and explore how different constraints, such as shoreline change characteristics (eroding, stable, accreting), distance to nearby inlets and island width, affect the probability distributions of future morphological characteristics. Our work demonstrates that a skillful BN can be constructed and that factors such as distance to inlet, shoreline change rate, and the presence of human alterations have the strongest influences on network performance. For Assateague Island, Maryland/Virginia, USA, we find that different shoreline change behaviors affect the probabilities of specific geomorphic characteristics, such as dune height, which allows us to identify vulnerable locations on the barrier island where habitat or infrastructure may be vulnerable to storms and sea-level rise.

  20. On the complex quantification of risk: systems-based perspective on terrorism.

    PubMed

    Haimes, Yacov Y

    2011-08-01

    This article highlights the complexity of the quantification of the multidimensional risk function, develops five systems-based premises on quantifying the risk of terrorism to a threatened system, and advocates the quantification of vulnerability and resilience through the states of the system. The five premises are: (i) There exists interdependence between a specific threat to a system by terrorist networks and the states of the targeted system, as represented through the system's vulnerability, resilience, and criticality-impact. (ii) A specific threat, its probability, its timing, the states of the targeted system, and the probability of consequences can be interdependent. (iii) The two questions in the risk assessment process: "What is the likelihood?" and "What are the consequences?" can be interdependent. (iv) Risk management policy options can reduce both the likelihood of a threat to a targeted system and the associated likelihood of consequences by changing the states (including both vulnerability and resilience) of the system. (v) The quantification of risk to a vulnerable system from a specific threat must be built on a systemic and repeatable modeling process, by recognizing that the states of the system constitute an essential step to construct quantitative metrics of the consequences based on intelligence gathering, expert evidence, and other qualitative information. The fact that the states of all systems are functions of time (among other variables) makes the time frame pivotal in each component of the process of risk assessment, management, and communication. Thus, risk to a system, caused by an initiating event (e.g., a threat) is a multidimensional function of the specific threat, its probability and time frame, the states of the system (representing vulnerability and resilience), and the probabilistic multidimensional consequences. © 2011 Society for Risk Analysis.

  1. Complex networks in confined comminution

    NASA Astrophysics Data System (ADS)

    Walker, David M.; Tordesillas, Antoinette; Einav, Itai; Small, Michael

    2011-08-01

    The physical process of confined comminution is investigated within the framework of complex networks. We first characterize the topology of the unweighted contact networks as generated by the confined comminution process. We find this process gives rise to an ultimate contact network which exhibits a scale-free degree distribution and small world properties. In particular, if viewed in the context of networks through which information travels along shortest paths, we find that the global average of the node vulnerability decreases as the comminution process continues, with individual node vulnerability correlating with grain size. A possible application to the design of synthetic networks (e.g., sensor networks) is highlighted. Next we turn our attention to the physics of the granular comminution process and examine force transmission with respect to the weighted contact networks, where each link is weighted by the inverse magnitude of the normal force acting at the associated contact. We find that the strong forces (i.e., force chains) are transmitted along pathways in the network which are mainly following shortest-path routing protocols, as typically found, for example, in communication systems. Motivated by our earlier studies of the building blocks for self-organization in dense granular systems, we also explore the properties of the minimal contact cycles. The distribution of the contact strain energy intensity of 4-cycle motifs in the ultimate state of the confined comminution process is shown to be consistent with a scale-free distribution with infinite variance, thereby suggesting that 4-cycle arrangements of grains are capable of storing vast amounts of energy in their contacts without breaking.

  2. Power laws and fragility in flow networks.

    PubMed

    Shore, Jesse; Chu, Catherine J; Bianchi, Matt T

    2013-01-01

    What makes economic and ecological networks so unlike other highly skewed networks in their tendency toward turbulence and collapse? Here, we explore the consequences of a defining feature of these networks: their nodes are tied together by flow. We show that flow networks tend to the power law degree distribution (PLDD) due to a self-reinforcing process involving position within the global network structure, and thus present the first random graph model for PLDDs that does not depend on a rich-get-richer function of nodal degree. We also show that in contrast to non-flow networks, PLDD flow networks are dramatically more vulnerable to catastrophic failure than non-PLDD flow networks, a finding with potential explanatory power in our age of resource- and financial-interdependence and turbulence.

  3. Effects of climate change and wildfire on stream temperatures and salmonid thermal habitat in a mountain river network

    Treesearch

    Daniel J. Isaak; Charles H. Luce; Bruce E. Rieman; David E. Nagel; Erin E. Peterson; Dona L. Horan; Sharon Parkes; Gwynne L. Chandler

    2010-01-01

    Mountain streams provide important habitats for many species, but their faunas are especially vulnerable to climate change because of ectothermic physiologies and movements that are constrained to linear networks that are easily fragmented. Effectively conserving biodiversity in these systems requires accurate downscaling of climatic trends to local habitat conditions...

  4. Identifying the Critical Links in Road Transportation Networks: Centrality-based approach utilizing structural properties

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Supriya

    Surface transportation road networks share structural properties similar to other complex networks (e.g., social networks, information networks, biological networks, and so on). This research investigates the structural properties of road networks for any possible correlation with the traffic characteristics such as link flows those determined independently. Additionally, we define a criticality index for the links of the road network that identifies the relative importance in the network. We tested our hypotheses with two sample road networks. Results show that, correlation exists between the link flows and centrality measures of a link of the road (dual graph approach is followed) andmore » the criticality index is found to be effective for one test network to identify the vulnerable nodes.« less

  5. An exploratory model of girls' vulnerability to commercial sexual exploitation in prostitution.

    PubMed

    Reid, Joan A

    2011-05-01

    Due to inaccessibility of child victims of commercial sexual exploitation, the majority of emergent research on the problem lacks theoretical framing or sufficient data for quantitative analysis. Drawing from Agnew's general strain theory, this study utilized structural equation modeling to explore: whether caregiver strain is linked to child maltreatment, if experiencing maltreatment is associated with risk-inflating behaviors or sexual denigration of self/others, and if these behavioral and psychosocial dysfunctions are related to vulnerability to commercial sexual exploitation. The proposed model was tested with data from 174 predominately African American women, 12% of whom indicated involvement in prostitution while a minor. Findings revealed child maltreatment worsened with increased caregiver strain. Experiencing child maltreatment was linked to running away, initiating substance use at earlier ages, and higher levels of sexual denigration of self/others. Sexual denigration of self/others was significantly related to the likelihood of prostitution as a minor. The network of variables in the model accounted for 34% of the variance in prostitution as a minor.

  6. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  7. Site- and bond-percolation thresholds in K_{n,n}-based lattices: Vulnerability of quantum annealers to random qubit and coupler failures on chimera topologies.

    PubMed

    Melchert, O; Katzgraber, Helmut G; Novotny, M A

    2016-04-01

    We estimate the critical thresholds of bond and site percolation on nonplanar, effectively two-dimensional graphs with chimeralike topology. The building blocks of these graphs are complete and symmetric bipartite subgraphs of size 2n, referred to as K_{n,n} graphs. For the numerical simulations we use an efficient union-find-based algorithm and employ a finite-size scaling analysis to obtain the critical properties for both bond and site percolation. We report the respective percolation thresholds for different sizes of the bipartite subgraph and verify that the associated universality class is that of standard two-dimensional percolation. For the canonical chimera graph used in the D-Wave Systems Inc. quantum annealer (n=4), we discuss device failure in terms of network vulnerability, i.e., we determine the critical fraction of qubits and couplers that can be absent due to random failures prior to losing large-scale connectivity throughout the device.

  8. Discovering cancer vulnerabilities using high-throughput micro-RNA screening.

    PubMed

    Nikolic, Iva; Elsworth, Benjamin; Dodson, Eoin; Wu, Sunny Z; Gould, Cathryn M; Mestdagh, Pieter; Marshall, Glenn M; Horvath, Lisa G; Simpson, Kaylene J; Swarbrick, Alexander

    2017-12-15

    Micro-RNAs (miRNAs) are potent regulators of gene expression and cellular phenotype. Each miRNA has the potential to target hundreds of transcripts within the cell thus controlling fundamental cellular processes such as survival and proliferation. Here, we exploit this important feature of miRNA networks to discover vulnerabilities in cancer phenotype, and map miRNA-target relationships across different cancer types. More specifically, we report the results of a functional genomics screen of 1280 miRNA mimics and inhibitors in eight cancer cell lines, and its presentation in a sophisticated interactive data portal. This resource represents the most comprehensive survey of miRNA function in oncology, incorporating breast cancer, prostate cancer and neuroblastoma. A user-friendly web portal couples this experimental data with multiple tools for miRNA target prediction, pathway enrichment analysis and visualization. In addition, the database integrates publicly available gene expression and perturbation data enabling tailored and context-specific analysis of miRNA function in a particular disease. As a proof-of-principle, we use the database and its innovative features to uncover novel determinants of the neuroblastoma malignant phenotype. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  9. Software Vulnerability Taxonomy Consolidation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Polepeddi, Sriram S.

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of amore » particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to system administrators, software developers and vulnerability researchers is not yet achieved, this work has resulted in the most exhaustive collection of vulnerability data to date.« less

  10. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  11. Transaction costs economics of irreplaceability: ex ante and ex post evaluation of conservation networks' vulnerability to environmental shocks.

    PubMed

    Huusom, Henrik; Strange, Niels

    2008-04-01

    The theoretical concept, "asset specificity," is applied to real data in the context of Danish nature conservation network planning in order to produce illustrative examples of an economic measure of the network's vulnerability to exogenous shocks to the species composition. Three different measures of asset specificity are quantified from the shadow value of eliminating a key species from the individual grid cells. This represents a novel approach and a different interpretation of the term, as it is conventionally used as a qualitative indicator in the transaction cost economics literature. Apart from supplementing existing cost measures with an indicator of risk associated with investments in protected areas, this study demonstrates how the estimation and interpretation of various asset specificity measures for geographical areas may qualify policy makers' choice of policy instrument in conservation planning. This differs from the more intuitive approach of basing policy instrument choice solely on the rarity of the species in a given area.

  12. Network-Physics(NP) Bec DIGITAL(#)-VULNERABILITY Versus Fault-Tolerant Analog

    NASA Astrophysics Data System (ADS)

    Alexander, G. K.; Hathaway, M.; Schmidt, H. E.; Siegel, E.

    2011-03-01

    Siegel[AMS Joint Mtg.(2002)-Abs.973-60-124] digits logarithmic-(Newcomb(1881)-Weyl(1914; 1916)-Benford(1938)-"NeWBe"/"OLDbe")-law algebraic-inversion to ONLY BEQS BEC:Quanta/Bosons= digits: Synthesis reveals EMP-like SEVERE VULNERABILITY of ONLY DIGITAL-networks(VS. FAULT-TOLERANT ANALOG INvulnerability) via Barabasi "Network-Physics" relative-``statics''(VS.dynamics-[Willinger-Alderson-Doyle(Not.AMS(5/09)]-]critique); (so called)"Quantum-computing is simple-arithmetic(sans division/ factorization); algorithmic-complexities: INtractibility/ UNdecidability/ INefficiency/NONcomputability / HARDNESS(so MIScalled) "noise"-induced-phase-transitions(NITS) ACCELERATION: Cook-Levin theorem Reducibility is Renormalization-(Semi)-Group fixed-points; number-Randomness DEFINITION via WHAT? Query(VS. Goldreich[Not.AMS(02)] How? mea culpa)can ONLY be MBCS "hot-plasma" versus digit-clumping NON-random BEC; Modular-arithmetic Congruences= Signal X Noise PRODUCTS = clock-model; NON-Shor[Physica A,341,586(04)] BEC logarithmic-law inversion factorization:Watkins number-thy. U stat.-phys.); P=/=NP TRIVIAL Proof: Euclid!!! [(So Miscalled) computational-complexity J-O obviation via geometry.

  13. The default mode network and recurrent depression: a neurobiological model of cognitive risk factors.

    PubMed

    Marchetti, Igor; Koster, Ernst H W; Sonuga-Barke, Edmund J; De Raedt, Rudi

    2012-09-01

    A neurobiological account of cognitive vulnerability for recurrent depression is presented based on recent developments of resting state neural networks. We propose that alterations in the interplay between task positive (TP) and task negative (TN) elements of the Default Mode Network (DMN) act as a neurobiological risk factor for recurrent depression mediated by cognitive mechanisms. In the framework, depression is characterized by an imbalance between TN-TP components leading to an overpowering of TP by TN activity. The TN-TP imbalance is associated with a dysfunctional internally-focused cognitive style as well as a failure to attenuate TN activity in the transition from rest to task. Thus we propose the TN-TP imbalance as overarching neural mechanism involved in crucial cognitive risk factors for recurrent depression, namely rumination, impaired attentional control, and cognitive reactivity. During remission the TN-TP imbalance persists predisposing to vulnerability of recurrent depression. Empirical data to support this model is reviewed. Finally, we specify how this framework can guide future research efforts.

  14. A robust trust establishment scheme for wireless sensor networks.

    PubMed

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  15. A Framework of Complex Adaptive Systems: Parents As Partners in the Neonatal Intensive Care Unit.

    PubMed

    DʼAgata, Amy L; McGrath, Jacqueline M

    2016-01-01

    Advances in neonatal care are allowing for increased infant survival; however, neurodevelopmental complications continue. Using a complex adaptive system framework, a broad analysis of the network of agents most influential to vulnerable infants in the neonatal intensive care unit (NICU) is presented: parent, nurse, and organization. By exploring these interconnected relationships and the emergent behaviors, a model of care that increases parental caregiving in the NICU is proposed. Supportive parent caregiving early in an infant's NICU stay has the potential for more sensitive caregiving and enhanced opportunities for attachment, perhaps positively impacting neurodevelopment.

  16. Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students.

    PubMed

    Kirwan, Gráinne H; Fullwood, Chris; Rooney, Brendan

    2018-02-01

    Social networking sites (SNSs) can provide cybercriminals with various opportunities, including gathering of user data and login credentials to enable fraud, and directing of users toward online locations that may install malware onto their devices. The techniques employed by such cybercriminals can include clickbait (text or video), advertisement of nonexistent but potentially desirable products, and hoax competitions/giveaways. This study aimed to identify risk factors associated with falling victim to these malicious techniques. An online survey was completed by 295 Malaysian undergraduate students, finding that more than one-third had fallen victim to SNS scams. Logistic regression analysis identified several victimization risk factors including having higher scores in impulsivity (specifically cognitive complexity), using fewer devices for SNSs, and having been on an SNS for a longer duration. No reliable model was found for vulnerability to hoax valuable gift giveaways and "friend view application" advertising specifically, but vulnerability to video clickbait was predicted by lower extraversion scores, higher levels of openness to experience, using fewer devices, and being on an SNS for a longer duration. Other personality traits were not associated with either overall victimization susceptibility or increased risk of falling victim to the specific techniques. However, age approached significance within both the video clickbait and overall victimization models. These findings suggest that routine activity theory may be particularly beneficial in understanding and preventing SNSs scam victimization.

  17. Vehicles instability criteria for flood risk assessment of a street network

    NASA Astrophysics Data System (ADS)

    Arrighi, Chiara; Huybrechts, Nicolas; Ouahsine, Abdellatif; Chassé, Patrick; Oumeraci, Hocine; Castelli, Fabio

    2016-05-01

    The mutual interaction between floods and human activity is a process, which has been evolving over history and has shaped flood risk pathways. In developed countries, many events have illustrated that the majority of the fatalities during a flood occurs in a vehicle, which is considered as a safe shelter but it may turn into a trap for several combinations of water depth and velocity. Thus, driving a car in floodwaters is recognized as the most crucial aggravating factor for people safety. On the other hand, the entrainment of vehicles may locally cause obstructions to the flow and induce the collapse of infrastructures. Flood risk to vehicles can be defined as the combination of the probability of a vehicle of being swept away (i.e. the hazard) and the actual traffic/parking density, i.e. the vulnerability. Hazard for vehicles can be assessed through the spatial identification and mapping of the critical conditions for vehicles incipient motion. This analysis requires a flood map with information on water depth and velocity and consistent instability criteria accounting for flood and vehicles characteristics. Vulnerability is evaluated thanks to the road network and traffic data. Therefore, vehicles flood risk mapping can support people's education and management practices in order to reduce the casualties. In this work, a flood hazard classification for vehicles is introduced and an application to a real case study is presented and discussed.

  18. Association of Lipidome Remodeling in the Adipocyte Membrane with Acquired Obesity in Humans

    PubMed Central

    Gopalacharyulu, Peddinti; Tang, Jing; Rodriguez-Cuenca, Sergio; Maciejewski, Arkadiusz; Naukkarinen, Jussi; Ruskeepää, Anna-Liisa; Niemelä, Perttu S.; Yetukuri, Laxman; Tan, Chong Yew; Velagapudi, Vidya; Castillo, Sandra; Nygren, Heli; Hyötyläinen, Tuulia; Rissanen, Aila; Kaprio, Jaakko; Yki-Järvinen, Hannele; Vattulainen, Ilpo; Vidal-Puig, Antonio; Orešič, Matej

    2011-01-01

    Identification of early mechanisms that may lead from obesity towards complications such as metabolic syndrome is of great interest. Here we performed lipidomic analyses of adipose tissue in twin pairs discordant for obesity but still metabolically compensated. In parallel we studied more evolved states of obesity by investigating a separated set of individuals considered to be morbidly obese. Despite lower dietary polyunsaturated fatty acid intake, the obese twin individuals had increased proportions of palmitoleic and arachidonic acids in their adipose tissue, including increased levels of ethanolamine plasmalogens containing arachidonic acid. Information gathered from these experimental groups was used for molecular dynamics simulations of lipid bilayers combined with dependency network analysis of combined clinical, lipidomics, and gene expression data. The simulations suggested that the observed lipid remodeling maintains the biophysical properties of lipid membranes, at the price, however, of increasing their vulnerability to inflammation. Conversely, in morbidly obese subjects, the proportion of plasmalogens containing arachidonic acid in the adipose tissue was markedly decreased. We also show by in vitro Elovl6 knockdown that the lipid network regulating the observed remodeling may be amenable to genetic modulation. Together, our novel approach suggests a physiological mechanism by which adaptation of adipocyte membranes to adipose tissue expansion associates with positive energy balance, potentially leading to higher vulnerability to inflammation in acquired obesity. Further studies will be needed to determine the cause of this effect. PMID:21666801

  19. Socio-economic vulnerability of coastal communities in southern Thailand: the development of adaptation strategies

    NASA Astrophysics Data System (ADS)

    Willroth, P.; Massmann, F.; Wehrhahn, R.; Revilla Diez, J.

    2012-08-01

    The tsunami of December 2004 impacted large areas of Thailand's coastline and caused severe human and economic losses. The recovery period revealed differences in the vulnerabilities of communities affected. An understanding of the causal factors of vulnerability is crucial for minimising the negative effects of future threats and developing adaptive capacities. This paper analyses the vulnerabilities and the development of adaptation strategies in the booming tourist area of Khao Lak and in the predominantly fishing and agricultural area of Ban Nam Khem through a comprehensive vulnerability framework. The results show that social networks played a crucial role in coping with the disaster. Social cohesion is important for strengthening the community and developing successful adaptation strategies. The development of tourism and the turning away from traditional activities have a significant positive influence on the income situation, but create a dependency on a single business sector. It could be shown that households generating their income in the tourism sector were vulnerable unless they had diversified their income previously. Income diversification decreased the vulnerability in the study areas. Adaptation strategies and processes developed in the aftermath clearly address these issues.

  20. Varying geospatial analyses to assess climate risk and adaptive capacity in a hotter, drier Southwestern United States

    NASA Astrophysics Data System (ADS)

    Elias, E.; Reyes, J. J.; Steele, C. M.; Rango, A.

    2017-12-01

    Assessing vulnerability of agricultural systems to climate variability and change is vital in securing food systems and sustaining rural livelihoods. Farmers, ranchers, and forest landowners rely on science-based, decision-relevant, and localized information to maintain production, ecological viability, and economic returns. This contribution synthesizes a collection of research on the future of agricultural production in the American Southwest (SW). Research was based on a variety of geospatial methodologies and datasets to assess the vulnerability of rangelands and livestock, field crops, specialty crops, and forests in the SW to climate-risk and change. This collection emerged from the development of regional vulnerability assessments for agricultural climate-risk by the U.S. Department of Agriculture (USDA) Climate Hub Network, established to deliver science-based information and technologies to enable climate-informed decision-making. Authors defined vulnerability differently based on their agricultural system of interest, although each primarily focuses on biophysical systems. We found that an inconsistent framework for vulnerability and climate risk was necessary to adequately capture the diversity, variability, and heterogeneity of SW landscapes, peoples, and agriculture. Through the diversity of research questions and methodologies, this collection of articles provides valuable information on various aspects of SW vulnerability. All articles relied on geographic information systems technology, with highly variable levels of complexity. Agricultural articles used National Agricultural Statistics Service data, either as tabular county level summaries or through the CropScape cropland raster datasets. Most relied on modeled historic and future climate information, but with differing assumptions regarding spatial resolution and temporal framework. We assert that it is essential to evaluate climate risk using a variety of complementary methodologies and perspectives. In addition, we found that spatial analysis supports informed adaptation, within and outside the SW United States. The persistence and adaptive capacity of agriculture in the water-limited Southwest serves as an instructive example and may offer solutions to reduce future climate risk.

  1. North Europe power transmission system vulnerability during extreme space weather

    NASA Astrophysics Data System (ADS)

    Piccinelli, Roberta; Krausmann, Elisabeth

    2018-01-01

    Space weather driven by solar activity can induce geomagnetic disturbances at the Earth's surface that can affect power transmission systems. Variations in the geomagnetic field result in geomagnetically induced currents that can enter the system through its grounding connections, saturate transformers and lead to system instability and possibly collapse. This study analyzes the impact of extreme space weather on the northern part of the European power transmission grid for different transformer designs to understand its vulnerability in case of an extreme event. The behavior of the system was analyzed in its operational mode during a severe geomagnetic storm, and mitigation measures, like line compensation, were also considered. These measures change the topology of the system, thus varying the path of geomagnetically induced currents and inducing a local imbalance in the voltage stability superimposed on the grid operational flow. Our analysis shows that the North European power transmission system is fairly robust against extreme space weather events. When considering transformers more vulnerable to geomagnetic storms, only few episodes of instability were found in correspondence with an existing voltage instability due to the underlying system load. The presence of mitigation measures limited the areas of the network in which bus voltage instabilities arise with respect to the system in which mitigation measures are absent.

  2. Coastal Vulnerability and risk assessment of infrastructures, natural and cultural heritage sites in Greece.

    NASA Astrophysics Data System (ADS)

    Alexandrakis, George; Kampanis, Nikolaos

    2016-04-01

    The majority of human activities are concentrated around coastal areas, making coastline retreat, a significant threat to coastal infrastructure, thus increasing protection cost and investment revenue losses. In this study the management of coastal areas in terms of protecting coastal infrastructures, cultural and environmental heritage sites, through risk assessment analysis is been made. The scope is to provide data for spatial planning for future developments in the coastal zone and the protection of existing ones. Also to determine the impact of coastal changes related to the loss of natural resources, agricultural land and beaches. The analysis is based on a multidisciplinary approach, combining environmental, spatial and economic data. This can be implemented by integrating the assessment of vulnerability of coasts, the spatial distribution and structural elements of coastal infrastructure (transport, tourism, and energy) and financial data by region, in a spatial database. The approach is based on coastal vulnerability estimations, considering sea level rise, land loss, extreme events, safety, adaptability and resilience of infrastructure and natural sites. It is based on coupling of environmental indicators and econometric models to determine the socio-economic impact in coastal infrastructure, cultural and environmental heritage sites. The indicators include variables like the coastal geomorphology; coastal slope; relative sea-level rise rate; shoreline erosion/accretion rate; mean tidal range and mean wave height. The anthropogenic factors include variables like settlements, sites of cultural heritage, transport networks, land uses, significance of infrastructure (e.g. military, power plans) and economic activities. The analysis in performed by a GIS application. The forcing variables are determined with the use of sub-indices related to coastal geomorphology, climate and wave variables and the socioeconomics of the coastal zone. The Greek coastline in considered as a case study, where the majority of the coastline appears to be undergoing erosion, with approximately 25% of the Aegean coastline, consisting mainly of beach zones and low-lying coastal (including deltaic) plains. In terms of economic activates coastal tourism is most effected, as beach zones are very high vulnerable to erosion. Also, small ports in remote islands are also found to be highly vulnerable. Acknowledgments This work was implemented within the framework of "Post-Doctoral Excellence Scholarship. State Scholarships Foundation, Greece IKY- Siemens Action"

  3. Spatial patterns of atrophy, hypometabolism, and amyloid deposition in Alzheimer's disease correspond to dissociable functional brain networks.

    PubMed

    Grothe, Michel J; Teipel, Stefan J

    2016-01-01

    Recent neuroimaging studies of Alzheimer's disease (AD) have emphasized topographical similarities between AD-related brain changes and a prominent cortical association network called the default-mode network (DMN). However, the specificity of distinct imaging abnormalities for the DMN compared to other intrinsic connectivity networks (ICNs) of the limbic and heteromodal association cortex has not yet been examined systematically. We assessed regional amyloid load using AV45-PET, neuronal metabolism using FDG-PET, and gray matter volume using structural MRI in 473 participants from the Alzheimer's Disease Neuroimaging Initiative, including preclinical, predementia, and clinically manifest AD stages. Complementary region-of-interest and voxel-based analyses were used to assess disease stage- and modality-specific changes within seven principle ICNs of the human brain as defined by a standardized functional connectivity atlas. Amyloid deposition in AD dementia showed a preference for the DMN, but high effect sizes were also observed for other neocortical ICNs, most notably the frontoparietal-control network. Atrophic changes were most specific for an anterior limbic network, followed by the DMN, whereas other neocortical networks were relatively spared. Hypometabolism appeared to be a mixture of both amyloid- and atrophy-related profiles. Similar patterns of modality-dependent network specificity were also observed in the predementia and, for amyloid deposition, in the preclinical stage. These quantitative data confirm a high vulnerability of the DMN for multimodal imaging abnormalities in AD. However, rather than being selective for the DMN, imaging abnormalities more generally affect higher order cognitive networks and, importantly, the vulnerability profiles of these networks markedly differ for distinct aspects of AD pathology. © 2015 Wiley Periodicals, Inc.

  4. A simple model of global cascades on random networks

    NASA Astrophysics Data System (ADS)

    Watts, Duncan J.

    2002-04-01

    The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.

  5. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  6. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

    PubMed Central

    Williams, Patricia AH; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513

  7. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

    PubMed

    Williams, Patricia Ah; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.

  8. A GIS Approach to Identifying Socially and Medically Vulnerable Older Adult Populations in South Florida.

    PubMed

    Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira

    2017-11-10

    We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    PubMed Central

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-01-01

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action. PMID:26512681

  10. Toward Understanding How Early-Life Stress Reprograms Cognitive and Emotional Brain Networks.

    PubMed

    Chen, Yuncai; Baram, Tallie Z

    2016-01-01

    Vulnerability to emotional disorders including depression derives from interactions between genes and environment, especially during sensitive developmental periods. Adverse early-life experiences provoke the release and modify the expression of several stress mediators and neurotransmitters within specific brain regions. The interaction of these mediators with developing neurons and neuronal networks may lead to long-lasting structural and functional alterations associated with cognitive and emotional consequences. Although a vast body of work has linked quantitative and qualitative aspects of stress to adolescent and adult outcomes, a number of questions are unclear. What distinguishes 'normal' from pathologic or toxic stress? How are the effects of stress transformed into structural and functional changes in individual neurons and neuronal networks? Which ones are affected? We review these questions in the context of established and emerging studies. We introduce a novel concept regarding the origin of toxic early-life stress, stating that it may derive from specific patterns of environmental signals, especially those derived from the mother or caretaker. Fragmented and unpredictable patterns of maternal care behaviors induce a profound chronic stress. The aberrant patterns and rhythms of early-life sensory input might also directly and adversely influence the maturation of cognitive and emotional brain circuits, in analogy to visual and auditory brain systems. Thus, unpredictable, stress-provoking early-life experiences may influence adolescent cognitive and emotional outcomes by disrupting the maturation of the underlying brain networks. Comprehensive approaches and multiple levels of analysis are required to probe the protean consequences of early-life adversity on the developing brain. These involve integrated human and animal-model studies, and approaches ranging from in vivo imaging to novel neuroanatomical, molecular, epigenomic, and computational methodologies. Because early-life adversity is a powerful determinant of subsequent vulnerabilities to emotional and cognitive pathologies, understanding the underlying processes will have profound implications for the world's current and future children.

  11. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  12. Brain structural covariance network centrality in maltreated youth with PTSD and in maltreated youth resilient to PTSD.

    PubMed

    Sun, Delin; Haswell, Courtney C; Morey, Rajendra A; De Bellis, Michael D

    2018-04-10

    Child maltreatment is a major cause of pediatric posttraumatic stress disorder (PTSD). Previous studies have not investigated potential differences in network architecture in maltreated youth with PTSD and those resilient to PTSD. High-resolution magnetic resonance imaging brain scans at 3 T were completed in maltreated youth with PTSD (n = 31), without PTSD (n = 32), and nonmaltreated controls (n = 57). Structural covariance network architecture was derived from between-subject intraregional correlations in measures of cortical thickness in 148 cortical regions (nodes). Interregional positive partial correlations controlling for demographic variables were assessed, and those correlations that exceeded specified thresholds constituted connections in cortical brain networks. Four measures of network centrality characterized topology, and the importance of cortical regions (nodes) within the network architecture were calculated for each group. Permutation testing and principle component analysis method were employed to calculate between-group differences. Principle component analysis is a methodological improvement to methods used in previous brain structural covariance network studies. Differences in centrality were observed between groups. Larger centrality was found in maltreated youth with PTSD in the right posterior cingulate cortex; smaller centrality was detected in the right inferior frontal cortex compared to youth resilient to PTSD and controls, demonstrating network characteristics unique to pediatric maltreatment-related PTSD. Larger centrality was detected in right frontal pole in maltreated youth resilient to PTSD compared to youth with PTSD and controls, demonstrating structural covariance network differences in youth resilience to PTSD following maltreatment. Smaller centrality was found in the left posterior cingulate cortex and in the right inferior frontal cortex in maltreated youth compared to controls, demonstrating attributes of structural covariance network topology that is unique to experiencing maltreatment. This work is the first to identify cortical thickness-based structural covariance network differences between maltreated youth with and without PTSD. We demonstrated network differences in both networks unique to maltreated youth with PTSD and those resilient to PTSD. The networks identified are important for the successful attainment of age-appropriate social cognition, attention, emotional processing, and inhibitory control. Our findings in maltreated youth with PTSD versus those without PTSD suggest vulnerability mechanisms for developing PTSD.

  13. Research on the information security system in electrical gis system in mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  14. Newcomers in a hazardous environment: a qualitative inquiry into sex worker vulnerability to HIV in Bali, Indonesia.

    PubMed

    Januraga, Pande Putu; Mooney-Somers, Julie; Ward, Paul R

    2014-08-11

    Women new to sex work and those with a greater degree of mobility have higher risk of HIV infection. Using social capital as a theoretical framework, we argue that better understanding of the interactions of micro-level structural factors can be valuable in reshaping and restructuring health promotion programmes in Bali to be more responsive to the concerns and needs of newcomer and mobile female sex workers (FSWs). We conducted interviews with 11 newcomer FSWs (worked < six months), 9 mobile FSWs (experienced but worked at the current brothel < six months), and 14 senior FSWs (experienced and worked at current brothel > six months). The interviews explored women's experience of sex work including how and why they came to sex work, relationships with other FSWs and their HIV prevention practices. A thematic framework analysis revealed newcomer FSWs faced multiple levels of vulnerability that contributed to increased HIV risk. First, a lack of knowledge and self-efficacy about HIV prevention practices was related to their younger age and low exposure to sexual education. Second, on entering sex work, they experienced intensely competitive working environments fuelled by economic competition. This competition reduced opportunities for positive social networks and social learning about HIV prevention. Finally, the lack of social networks and social capital between FSWs undermined peer trust and solidarity, both of which are essential to promote consistent condom use. For example, newcomer FSWs did not trust that if they refused to have sex without a condom, their peers would also refuse; this increased their likelihood of accepting unprotected sex, thereby increasing HIV risk. Public health and social welfare interventions and programmes need to build social networks, social support and solidarity within FSW communities, and provide health education and HIV prevention resources much earlier in women's sex work careers.

  15. Improving Accessibility for Seniors in a Life-Long Learning Network: A Usability Study of Learning Websites

    ERIC Educational Resources Information Center

    Gu, Xiaoqing; Ding, Rui; Fu, Shirong

    2011-01-01

    Senior citizens are comparatively vulnerable in accessing learning opportunities offered on the Internet due to usability problems in current web design. In an effort to build a senior-friendly learning web as a part of the Life-long Learning Network in Shanghai, usability studies of two websites currently available to Shanghai senior citizens…

  16. Moving Target Techniques: Leveraging Uncertainty for Cyber Defense

    DTIC Science & Technology

    2015-08-24

    vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic  Network   Techniques in the dynamic network domain change the properties

  17. A Study of How Young Adults Leverage Multiple Profile Management Functionality in Managing Their Online Reputation on Social Networking Sites

    ERIC Educational Resources Information Center

    McCune, T. John

    2017-01-01

    With privacy settings on social networking sites (SNS) perceived as complex and difficult to use and maintain, young adults can be left vulnerable to others accessing and using their personal information. Consequences of not regulating the boundaries their information on SNS include the ability for current and future employers to make…

  18. Evaluating the impact of bike network indicators on cyclist safety using macro-level collision prediction models.

    PubMed

    Osama, Ahmed; Sayed, Tarek

    2016-12-01

    Many cities worldwide are recognizing the important role that cycling plays in creating green and livable communities. However, vulnerable road users such as cyclists are usually subjected to an elevated level of injury risk which discourages many road users to cycle. This paper studies cyclist-vehicle collisions at 134 traffic analysis zones in the city of Vancouver to assess the impact of bike network structure on cyclist safety. Several network indicators were developed using Graph theory and their effect on cyclist safety was investigated. The indicators included measures of connectivity, directness, and topography of the bike network. The study developed several macro-level (zonal) collision prediction models that explicitly incorporated bike network indicators as explanatory variables. As well, the models incorporated the actual cyclist exposure (bike kilometers travelled) as opposed to relying on proxies such as population or bike network length. The macro-level collision prediction models were developed using generalized linear regression and full Bayesian techniques, with and without spatial effects. The models showed that cyclist collisions were positively associated with bike and vehicle exposure. The exponents of the exposure variables were less than one which supports the "safety in numbers" hypothesis. Moreover, the models showed positive associations between cyclist collisions and the bike network connectivity and linearity indicators. In contrast, negative associations were found between cyclist collisions and the bike network continuity and topography indicators. The spatial effects were statistically significant in all of the developed models. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Integrating network ecology with applied conservation: a synthesis and guide to implementation.

    PubMed

    Kaiser-Bunbury, Christopher N; Blüthgen, Nico

    2015-07-10

    Ecological networks are a useful tool to study the complexity of biotic interactions at a community level. Advances in the understanding of network patterns encourage the application of a network approach in other disciplines than theoretical ecology, such as biodiversity conservation. So far, however, practical applications have been meagre. Here we present a framework for network analysis to be harnessed to advance conservation management by using plant-pollinator networks and islands as model systems. Conservation practitioners require indicators to monitor and assess management effectiveness and validate overall conservation goals. By distinguishing between two network attributes, the 'diversity' and 'distribution' of interactions, on three hierarchical levels (species, guild/group and network) we identify seven quantitative metrics to describe changes in network patterns that have implications for conservation. Diversity metrics are partner diversity, vulnerability/generality, interaction diversity and interaction evenness, and distribution metrics are the specialization indices d' and [Formula: see text] and modularity. Distribution metrics account for sampling bias and may therefore be suitable indicators to detect human-induced changes to plant-pollinator communities, thus indirectly assessing the structural and functional robustness and integrity of ecosystems. We propose an implementation pathway that outlines the stages that are required to successfully embed a network approach in biodiversity conservation. Most importantly, only if conservation action and study design are aligned by practitioners and ecologists through joint experiments, are the findings of a conservation network approach equally beneficial for advancing adaptive management and ecological network theory. We list potential obstacles to the framework, highlight the shortfall in empirical, mostly experimental, network data and discuss possible solutions. Published by Oxford University Press on behalf of the Annals of Botany Company.

  20. Evaluating the intersection of a regional wildlife connectivity network with highways.

    PubMed

    Cushman, Samuel A; Lewis, Jesse S; Landguth, Erin L

    2013-01-01

    Reliable predictions of regional-scale population connectivity are needed to prioritize conservation actions. However, there have been few examples of regional connectivity models that are empirically derived and validated. The central goals of this paper were to (1) evaluate the effectiveness of factorial least cost path corridor mapping on an empirical resistance surface in reflecting the frequency of highway crossings by American black bear, (2) predict the location and predicted intensity of use of movement corridors for American black bear, and (3) identify where these corridors cross major highways and rank the intensity of these crossings. We used factorial least cost path modeling coupled with resistant kernel analysis to predict a network of movement corridors across a 30.2 million hectare analysis area in Montana and Idaho, USA. Factorial least cost path corridor mapping was associated with the locations of actual bear highway crossings. We identified corridor-highway intersections and ranked these based on corridor strength. We found that a major wildlife crossing overpass structure was located close to one of the most intense predicted corridors, and that the vast majority of the predicted corridor network was "protected" under federal management. However, narrow, linear corridors connecting the Greater Yellowstone Ecosystem to the rest of the analysis area had limited protection by federal ownership, making these additionally vulnerable to habitat loss and fragmentation. Factorial least cost path modeling coupled with resistant kernel analysis provides detailed, synoptic information about connectivity across populations that vary in distribution and density in complex landscapes. Specifically, our results could be used to quantify the structure of the connectivity network, identify critical linkage nodes and core areas, map potential barriers and fracture zones, and prioritize locations for mitigation, restoration and conservation actions.

  1. Tokunaga river networks: New empirical evidence and applications to transport problems

    NASA Astrophysics Data System (ADS)

    Tejedor, A.; Zaliapin, I. V.

    2013-12-01

    The Tokunaga self-similarity has proven to be an important constraint for the observed river networks. Notably, various Horton laws are naturally satisfied by the Tokunaga networks, which makes this model of considerable interest for theoretical analysis and modeling of environmental transport. Recall that Horton self-similarity is a weaker property of a tree graph that addresses its principal branching; it is a counterpart of the power-law size distribution for system's elements. The stronger Tokunaga self-similarity addresses so-called side branching; it ensures that different levels of a hierarchy have the same probabilistic structure (in a sense that can be rigorously defined). We describe an improved statistical framework for testing self-similarity in a finite tree and estimating the related parameters. The developed inference is applied to the major river basins in continental United States and Iberian Peninsula. The results demonstrate the validity of the Tokunaga model for the majority of the examined networks with very narrow (universal) range of parameter values. Next, we explore possible relationships between the Tokunaga parameter anomalies (deviations from the universal values) and climatic and geomorphologic characteristics of a region. Finally, we apply the Tokunaga model to explore vulnerability of river networks, defined via reaction of the river discharge to a storm.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christoph, G.G; Jackson, K.A.; Neuman, M.C.

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year andmore » a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.« less

  3. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  4. Tobacco use and friendship networks: a cross-sectional study among Brazilian adolescents.

    PubMed

    Jorge, Kelly Oliva; Cota, Luís Otavio; e Ferreira, Efigênia Ferreira; do Vale, Miriam Pimenta; Kawachi, Ichiro; Zarzar, Patrícia Maria

    2015-05-01

    To determine the prevalence of tobacco use and its association with types of friendship networks, socioeconomic status and gender among Brazilian adolescents. A cross-sectional study was carried out with a representative sample of 905 students aged 15 to 19 years. Information on social networks and tobacco use was collected by the self-administered questionnaire 'Alcohol, Smoking and Substance Involvement Screening Test" and the question "What is your most important group of close friends?'. Socioeconomic status was assessed using an area-based social vulnerability index and type of school. Multinomial logistic regression analysis was employed to test associations between tobacco use and the independent variables. The overall prevalence of tobacco use was 18.9%. Female adolescents had 3.80-fold greater odds of reporting weekly to daily tobacco use compared to male adolescents. Participants who reported that their most important groups of close friends were from church had a lower risk of reporting weekly to daily tobacco use in comparison to those who reported that their best friends were from school. The prevalence of tobacco use was high and was associated with school-based (as compared to church-based) friendship networks, female gender and higher area-level socioeconomic status.

  5. Policies on Protecting Vulnerable People During Disasters in Iran: A Document Analysis

    PubMed Central

    Abbasi Dolatabadi, Zahra; Seyedin, Hesam; Aryankhesal, Aidin

    2016-01-01

    Context Developing official protection policies for disasters is a main strategy in protecting vulnerable people. The aim of this study was to analyze official documents concerning policies on protecting vulnerable people during disasters. Evidence Acquisition This study was conducted by the qualitative document analysis method. Documents were gathered by searching websites and referring to the organizations involved in disaster management. The documents were assessed by a researcher-made data collection form. A directed content analysis approach was used to analyze the retrieved documents regarding the protection policies and legislation for vulnerable people. Results A total of 22 documents were included in the final analysis. Most of the documents referred to women, children, elderly people, poor, and villagers as vulnerable people. Moreover, the documents did not provide information regarding official measures for protecting vulnerable people during different phases of disaster management. Conclusions A clear and comprehensive definition of “vulnerable people” and formulation of official policies to protect them is needs to be formulated. Given the high prevalence of disasters in Iran, policy makers need to develop effective context-based policies to protect vulnerable people during disasters. PMID:27921019

  6. Robustness of the p53 network and biological hackers.

    PubMed

    Dartnell, Lewis; Simeonidis, Evangelos; Hubank, Michael; Tsoka, Sophia; Bogle, I David L; Papageorgiou, Lazaros G

    2005-06-06

    The p53 protein interaction network is crucial in regulating the metazoan cell cycle and apoptosis. Here, the robustness of the p53 network is studied by analyzing its degeneration under two modes of attack. Linear Programming is used to calculate average path lengths among proteins and the network diameter as measures of functionality. The p53 network is found to be robust to random loss of nodes, but vulnerable to a targeted attack against its hubs, as a result of its architecture. The significance of the results is considered with respect to mutational knockouts of proteins and the directed attacks mounted by tumour inducing viruses.

  7. Integrating Sediment Connectivity into Water Resources Management Trough a Graph Theoretic, Stochastic Modeling Framework.

    NASA Astrophysics Data System (ADS)

    Schmitt, R. J. P.; Castelletti, A.; Bizzi, S.

    2014-12-01

    Understanding sediment transport processes at the river basin scale, their temporal spectra and spatial patterns is key to identify and minimize morphologic risks associated to channel adjustments processes. This work contributes a stochastic framework for modeling bed-load connectivity based on recent advances in the field (e.g., Bizzi & Lerner, 2013; Czubas & Foufoulas-Georgiu, 2014). It presents river managers with novel indicators from reach scale vulnerability to channel adjustment in large river networks with sparse hydrologic and sediment observations. The framework comprises three steps. First, based on a distributed hydrological model and remotely sensed information, the framework identifies a representative grain size class for each reach. Second, sediment residence time distributions are calculated for each reach in a Monte-Carlo approach applying standard sediment transport equations driven by local hydraulic conditions. Third, a network analysis defines the up- and downstream connectivity for various travel times resulting in characteristic up/downstream connectivity signatures for each reach. Channel vulnerability indicators quantify the imbalance between up/downstream connectivity for each travel time domain, representing process dependent latency of morphologic response. Last, based on the stochastic core of the model, a sensitivity analysis identifies drivers of change and major sources of uncertainty in order to target key detrimental processes and to guide effective gathering of additional data. The application, limitation and integration into a decision analytic framework is demonstrated for a major part of the Red River Basin in Northern Vietnam (179.000 km2). Here, a plethora of anthropic alterations ranging from large reservoir construction to land-use changes results in major downstream deterioration and calls for deriving concerted sediment management strategies to mitigate current and limit future morphologic alterations.

  8. Network theory and its applications in economic systems

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the failure of over 350 US commercial banks during 2008 - 2011.

  9. A Multilayer perspective for the analysis of urban transportation systems

    PubMed Central

    Aleta, Alberto; Meloni, Sandro; Moreno, Yamir

    2017-01-01

    Public urban mobility systems are composed by several transportation modes connected together. Most studies in urban mobility and planning often ignore the multi-layer nature of transportation systems considering only aggregated versions of this complex scenario. In this work we present a model for the representation of the transportation system of an entire city as a multiplex network. Using two different perspectives, one in which each line is a layer and one in which lines of the same transportation mode are grouped together, we study the interconnected structure of 9 different cities in Europe raging from small towns to mega-cities like London and Berlin highlighting their vulnerabilities and possible improvements. Finally, for the city of Zaragoza in Spain, we also consider data about service schedule and waiting times, which allow us to create a simple yet realistic model for urban mobility able to reproduce real-world facts and to test for network improvements. PMID:28295015

  10. Stage structure alters how complexity affects stability of ecological networks

    USGS Publications Warehouse

    Rudolf, V.H.W.; Lafferty, Kevin D.

    2011-01-01

    Resolving how complexity affects stability of natural communities is of key importance for predicting the consequences of biodiversity loss. Central to previous stability analysis has been the assumption that the resources of a consumer are substitutable. However, during their development, most species change diets; for instance, adults often use different resources than larvae or juveniles. Here, we show that such ontogenetic niche shifts are common in real ecological networks and that consideration of these shifts can alter which species are predicted to be at risk of extinction. Furthermore, niche shifts reduce and can even reverse the otherwise stabilizing effect of complexity. This pattern arises because species with several specialized life stages appear to be generalists at the species level but act as sequential specialists that are hypersensitive to resource loss. These results suggest that natural communities are more vulnerable to biodiversity loss than indicated by previous analyses.

  11. Results of the Community Health Applied Research Network (CHARN) National Research Capacity Survey of Community Health Centers.

    PubMed

    Song, Hui; Li, Vivian; Gillespie, Suzanne; Laws, Reesa; Massimino, Stefan; Nelson, Christine; Singal, Robbie; Wagaw, Fikirte; Jester, Michelle; Weir, Rosy Chang

    2015-01-01

    The mission of the Community Health Applied Research Network (CHARN) is to build capacity to carry out Patient-Centered Outcomes Research at community health centers (CHCs), with the ultimate goal to improve health care for vulnerable populations. The CHARN Needs Assessment Staff Survey investigates CHCs' involvement in research, as well as their need for research training and resources. Results will be used to guide future training. The survey was developed and implemented in partnership with CHARN CHCs. Data were collected across CHARN CHCs. Data analysis and reports were conducted by the CHARN data coordinating center (DCC). Survey results highlighted gaps in staff research training, and these gaps varied by staff role. There is considerable variation in research involvement, partnerships, and focus both within and across CHCs. Development of training programs to increase research capacity should be tailored to address the specific needs and roles of staff involved in research.

  12. A Multilayer perspective for the analysis of urban transportation systems.

    PubMed

    Aleta, Alberto; Meloni, Sandro; Moreno, Yamir

    2017-03-15

    Public urban mobility systems are composed by several transportation modes connected together. Most studies in urban mobility and planning often ignore the multi-layer nature of transportation systems considering only aggregated versions of this complex scenario. In this work we present a model for the representation of the transportation system of an entire city as a multiplex network. Using two different perspectives, one in which each line is a layer and one in which lines of the same transportation mode are grouped together, we study the interconnected structure of 9 different cities in Europe raging from small towns to mega-cities like London and Berlin highlighting their vulnerabilities and possible improvements. Finally, for the city of Zaragoza in Spain, we also consider data about service schedule and waiting times, which allow us to create a simple yet realistic model for urban mobility able to reproduce real-world facts and to test for network improvements.

  13. Detection of dysregulated protein-association networks by high-throughput proteomics predicts cancer vulnerabilities.

    PubMed

    Lapek, John D; Greninger, Patricia; Morris, Robert; Amzallag, Arnaud; Pruteanu-Malinici, Iulian; Benes, Cyril H; Haas, Wilhelm

    2017-10-01

    The formation of protein complexes and the co-regulation of the cellular concentrations of proteins are essential mechanisms for cellular signaling and for maintaining homeostasis. Here we use isobaric-labeling multiplexed proteomics to analyze protein co-regulation and show that this allows the identification of protein-protein associations with high accuracy. We apply this 'interactome mapping by high-throughput quantitative proteome analysis' (IMAHP) method to a panel of 41 breast cancer cell lines and show that deviations of the observed protein co-regulations in specific cell lines from the consensus network affects cellular fitness. Furthermore, these aberrant interactions serve as biomarkers that predict the drug sensitivity of cell lines in screens across 195 drugs. We expect that IMAHP can be broadly used to gain insight into how changing landscapes of protein-protein associations affect the phenotype of biological systems.

  14. Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis

    NASA Technical Reports Server (NTRS)

    Malin, Jane T.; Fleming, Land

    2006-01-01

    We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.

  15. Percolation of a general network of networks.

    PubMed

    Gao, Jianxi; Buldyrev, Sergey V; Stanley, H Eugene; Xu, Xiaoming; Havlin, Shlomo

    2013-12-01

    Percolation theory is an approach to study the vulnerability of a system. We develop an analytical framework and analyze the percolation properties of a network composed of interdependent networks (NetONet). Typically, percolation of a single network shows that the damage in the network due to a failure is a continuous function of the size of the failure, i.e., the fraction of failed nodes. In sharp contrast, in NetONet, due to the cascading failures, the percolation transition may be discontinuous and even a single node failure may lead to an abrupt collapse of the system. We demonstrate our general framework for a NetONet composed of n classic Erdős-Rényi (ER) networks, where each network depends on the same number m of other networks, i.e., for a random regular network (RR) formed of interdependent ER networks. The dependency between nodes of different networks is taken as one-to-one correspondence, i.e., a node in one network can depend only on one node in the other network (no-feedback condition). In contrast to a treelike NetONet in which the size of the largest connected cluster (mutual component) depends on n, the loops in the RR NetONet cause the largest connected cluster to depend only on m and the topology of each network but not on n. We also analyzed the extremely vulnerable feedback condition of coupling, where the coupling between nodes of different networks is not one-to-one correspondence. In the case of NetONet formed of ER networks, percolation only exhibits two phases, a second order phase transition and collapse, and no first order percolation transition regime is found in the case of the no-feedback condition. In the case of NetONet composed of RR networks, there exists a first order phase transition when the coupling strength q (fraction of interdependency links) is large and a second order phase transition when q is small. Our insight on the resilience of coupled networks might help in designing robust interdependent systems.

  16. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    NASA Astrophysics Data System (ADS)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  17. Examining social, physical, and environmental dimensions of tornado vulnerability in Texas.

    PubMed

    Siebeneck, Laura

    2016-01-01

    To develop a vulnerability model that captures the social, physical, and environmental dimensions of tornado vulnerability of Texas counties. Guided by previous research and methodologies proposed in the hazards and emergency management literature, a principle components analysis is used to create a tornado vulnerability index. Data were gathered from open source information available through the US Census Bureau, American Community Surveys, and the Texas Natural Resources Information System. Texas counties. The results of the model yielded three indices that highlight geographic variability of social vulnerability, built environment vulnerability, and tornado hazard throughout Texas. Further analyses suggest that counties with the highest tornado vulnerability include those with high population densities and high tornado risk. This article demonstrates one method for assessing statewide tornado vulnerability and presents how the results of this type of analysis can be applied by emergency managers towards the reduction of tornado vulnerability in their communities.

  18. How Should We Treat the Vulnerable?: Qualitative Study of Authoritative Ethics Documents.

    PubMed

    Zagorac, Ivana

    2016-01-01

    The aim of this study is to explore what actual guidance is provided by authoritative ethics documents regarding the recognition and protection of the vulnerable. The documents included in this analysis are the Belmont Report, the Declaration of Helsinki, The Council for International Organizations of Medical Sciences (CIOMS) Guidelines, and the UNESCO Universal Declaration on Bioethics and Human Rights, including its supplementary report on vulnerability. A qualitative analysis of these documents was conducted in light of three questions: what is vulnerability, who are the vulnerable, and how should the vulnerable be protected? The results show significant differences among the documents regarding the first two questions. None of the documents provides any guidance on the third question (how to protect the vulnerable). These results suggest a great discrepancy between the acknowledged importance of the concept of vulnerability and a general understanding of the scope, content, and practical implications of vulnerability.

  19. An analysis of the accessibility of video lottery terminals: the case of Montréal.

    PubMed

    Robitaille, Eric; Herjean, Patrick

    2008-01-18

    Researchers and public health officials in Canada, the United States and Australia have for some time noted broader geographic accessibility to gambling establishments, above all in socioeconomically underprivileged communities. This increase in availability could lead to more and more gambling problems. This article focuses, in an ecological perspective, in particular on a spatial analysis of the geographic accessibility of sites possessing a VLT permit in the Montréal area, i.e. Montréal Island, the South Shore and Laval, from the standpoint of the development of an indicator of the vulnerability (socioeconomic components and demographic components) to gambling of populations at the level of certain neighbourhood units (dissemination areas). With the recent development of geographic information systems (GIS), it is now possible to ascertain accessibility to services much more accurately, for example by taking into account the configuration of the road network. The findings of our analysis reveal widespread geographic accessibility to sites possessing a VLT permit in the downtown area and in pericentral districts. In some neighbourhood units, a site possessing a VLT permit may be within a three-minute walk. In the region studied overall, average walking time to a VLT site is nine minutes. Access to this type of service on foot is usually limited in the outskirts. However, a number of groups of sites possessing VLT permits are found along certain axial highways. According to local spatial self-correlation analyses, the findings suggest a significant link between walking accessibility to sites possessing VLT permits and the vulnerability of the communities. In a number of neighbourhood units with ready access to VLT's the populations display high vulnerability. These findings reveal that accessibility to sites possessing a VLT permit is often linked to the vulnerability (socioeconomic and demographic components) of communities. Reliance in our analyses on neighbourhood units with fairly small areas enabled us to emphasize the rectilinear dimension of the spatial distribution of sites possessing VLT permits. This is a significant link that public health officials must consider when elaborating programs to combat pathological gambling.

  20. Modeling rain-fed maize vulnerability to droughts using the standardized precipitation index from satellite estimated rainfall—Southern Malawi case study

    USGS Publications Warehouse

    Funk, Christopher C.; Verdin, James; Adams Chavula,; Gregory J. Husak,; Harikishan Jayanthi,; Tamuka Magadzire,

    2013-01-01

    During 1990s, disaster risk reduction emerged as a novel, proactive approach to managing risks from natural hazards. The World Bank, USAID, and other international donor agencies began making efforts to mainstream disaster risk reduction in countries whose population and economies were heavily dependent on rain-fed agriculture. This approach has more significance in light of the increasing climatic hazard patterns and the climate scenarios projected for different hazard prone countries in the world. The Famine Early Warning System Network (FEWS NET) has been monitoring the food security issues in the sub-Saharan Africa, Asia and in Haiti. FEWS NET monitors the rainfall and moisture availability conditions with the help of NOAA RFE2 data for deriving food security status in Africa. This paper highlights the efforts in using satellite estimated rainfall inputs to develop drought vulnerability models in the drought prone areas in Malawi. The satellite RFE2 based SPI corresponding to the critical tasseling and silking phases (in the months of January, February, and March) were statistically regressed with drought-induced yield losses at the district level. The analysis has shown that the drought conditions in February and early March lead to most damage to maize yields in this region. The district-wise vulnerabilities to drought were upscaled to obtain a regional maize vulnerability model for southern Malawi. The results would help in establishing an early monitoring mechanism for drought impact assessment, give the decision makers additional time to assess seasonal outcomes, and identify potential food-related hazards in Malawi.

  1. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  2. An electrical betweenness approach for vulnerability assessment of power grids considering the capacity of generators and load

    NASA Astrophysics Data System (ADS)

    Wang, Kai; Zhang, Bu-han; Zhang, Zhe; Yin, Xiang-gen; Wang, Bo

    2011-11-01

    Most existing research on the vulnerability of power grids based on complex networks ignores the electrical characteristics and the capacity of generators and load. In this paper, the electrical betweenness is defined by considering the maximal demand of load and the capacity of generators in power grids. The loss of load, which reflects the ability of power grids to provide sufficient power to customers, is introduced to measure the vulnerability together with the size of the largest cluster. The simulation results of the IEEE-118 bus system and the Central China Power Grid show that the cumulative distributions of node electrical betweenness follow a power-law and that the nodes with high electrical betweenness play critical roles in both topological structure and power transmission of power grids. The results prove that the model proposed in this paper is effective for analyzing the vulnerability of power grids.

  3. Childhood maltreatment is associated with a sex-dependent functional reorganization of a brain inhibitory control network.

    PubMed

    Elton, Amanda; Tripathi, Shanti P; Mletzko, Tanja; Young, Jonathan; Cisler, Josh M; James, G Andrew; Kilts, Clinton D

    2014-04-01

    Childhood adversity represents a major risk factor for drug addiction and other mental disorders. However, the specific mechanisms by which childhood adversity impacts human brain organization to confer greater vulnerability for negative outcomes in adulthood is largely unknown. As an impaired process in drug addiction, inhibitory control of behavior was investigated as a target of childhood maltreatment (abuse and neglect). Forty adults without Axis-I psychiatric disorders (21 females) completed a Childhood Trauma Questionnaire (CTQ) and underwent functional MRI (fMRI) while performing a stop-signal task. A group independent component analysis identified a putative brain inhibitory control network. Graph theoretical analyses and structural equation modeling investigated the impact of childhood maltreatment on the functional organization of this neural processing network. Graph theory outcomes revealed sex differences in the relationship between network functional connectivity and inhibitory control which were dependent on the severity of childhood maltreatment exposure. A network effective connectivity analysis indicated that a maltreatment dose-related negative modulation of dorsal anterior cingulate (dACC) activity by the left inferior frontal cortex (IFC) predicted better response inhibition and lesser attention deficit hyperactivity disorder (ADHD) symptoms in females, but poorer response inhibition and greater ADHD symptoms in males. Less inhibition of the right IFC by dACC in males with higher CTQ scores improved inhibitory control ability. The childhood maltreatment-related reorganization of a brain inhibitory control network provides sex-dependent mechanisms by which childhood adversity may confer greater risk for drug use and related disorders and by which adaptive brain responses protect individuals from this risk factor. Copyright © 2013 Wiley Periodicals, Inc.

  4. Auditing Albaha University Network Security using in-house Developed Penetration Tool

    NASA Astrophysics Data System (ADS)

    Alzahrani, M. E.

    2018-03-01

    Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.

  5. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  6. Optimizing topological cascade resilience based on the structure of terrorist networks.

    PubMed

    Gutfraind, Alexander

    2010-11-10

    Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades--to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimization method for constructing networks with high passive cascade resilience. The optimal networks are found to be based on cells, where each cell has a star topology. Counterintuitively, we find that there are conditions where networks should not be modified to stop cascades because doing so would come at a disproportionate loss of efficiency. Implementation of these findings can lead to more cascade-resilient networks in many diverse areas.

  7. Using Bayesian networks to assess the vulnerability of Hawaiian terrestrial biota to climate change

    NASA Astrophysics Data System (ADS)

    Fortini, L.; Jacobi, J.; Price, J.; Vorsino, A.; Paxton, E.; Amidon, F.; 'Ohukani'ohi'a Gon, S., III; Koob, G.; Brink, K.; Burgett, J.; Miller, S.

    2012-12-01

    As the effects of climate change on individual species become increasingly apparent, there is a clear need for effective adaptation planning to prevent an increase in species extinctions worldwide. Given the limited understanding of species responses to climate change, vulnerability assessments and species distribution models (SDMs) have been two common tools used to jump-start climate change adaptation efforts. However, although these two approaches generally serve the same purpose of understanding species future responses to climate change, they have rarely mixed. In collaboration with research and management partners from federal, state and non-profit organizations, we are conducting a climate change vulnerability assessment for hundreds of plant and forest bird species of the Main Hawaiian Islands. This assessment is the first to comprehensively consider the potential threats of climate change to a significant portion of Hawaii's fauna and flora (over one thousand species considered) and thus fills a critical gap defined by natural resource scientists and managers in the region. We have devised a flexible approach that effectively integrates species distribution models into a vulnerability assessment framework that can be easily updated with improved models and data. This tailors our assessment approach to the Pacific Island reality of often limited and fragmented information on species and large future climate uncertainties, This vulnerability assessment is based on a Bayesian network-based approach that integrates multiple landscape (e.g., topographic diversity, dispersal barriers), species trait (e.g., generation length, fecundity) and expert-knowledge based information (e.g., capacity to colonize restored habitat) relevant to long-term persistence of species under climate change. Our presentation will highlight some of the results from our assessment but will mainly focus on the utility of the flexible approach we have developed and its potential application in other settings.

  8. Traditional and alternative community food security interventions in Montréal, Québec: different practices, different people.

    PubMed

    Roncarolo, Federico; Adam, Caroline; Bisset, Sherri; Potvin, Louise

    2015-04-01

    Food insecurity is steadily increasing in developed countries. Traditional interventions adopted to tackle food insecurity, like food banks, address the urgent need for food. By contrast, alternative interventions, such as community gardens and kitchens, are oriented towards social integration and the development of mutual aid networks. The objective of this paper is to examine whether the populations served by traditional and alternative interventions in food security differ according to measures of vulnerability. We studied newly registered participants to food security interventions. Participants were selected from a random sample of food security community organizations in a two-stage cluster sampling frame. The categorizing variable was participation in a community organization providing either traditional interventions or alternative interventions. Seven measures of vulnerability were used: food security; perceived health; civic participation; perceived social support of the primary network, social isolation, income and education. Regression multilevel models were used to assess associations. 711 participants in traditional interventions and 113 in alternative interventions were enrolled in the study. Between group differences were found with respect to food insecurity, health status perception, civic participation, education and income, but not with respect to social isolation or perceived social support from primary social network. Traditional and alternative food security interventions seem to reach different populations. Participants in traditional interventions were found to have less access to resources, compared to those in alternative interventions. Thus, new participants in traditional interventions may have higher levers of vulnerability than those in alternative interventions.

  9. Cyber Hygiene for Control System Security

    DOE PAGES

    Oliver, David

    2015-10-08

    There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

  10. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  11. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  12. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  13. Assessing coastal wetland vulnerability to sea-level rise along the northern Gulf of Mexico coast: Gaps and opportunities for developing a coordinated regional sampling network

    PubMed Central

    Griffith, Kereen T.; Larriviere, Jack C.; Feher, Laura C.; Cahoon, Donald R.; Enwright, Nicholas M.; Oster, David A.; Tirpak, John M.; Woodrey, Mark S.; Collini, Renee C.; Baustian, Joseph J.; Breithaupt, Joshua L.; Cherry, Julia A.; Conrad, Jeremy R.; Cormier, Nicole; Coronado-Molina, Carlos A.; Donoghue, Joseph F.; Graham, Sean A.; Harper, Jennifer W.; Hester, Mark W.; Howard, Rebecca J.; Krauss, Ken W.; Kroes, Daniel E.; Lane, Robert R.; McKee, Karen L.; Mendelssohn, Irving A.; Middleton, Beth A.; Moon, Jena A.; Piazza, Sarai C.; Rankin, Nicole M.; Sklar, Fred H.; Steyer, Greg D.; Swanson, Kathleen M.; Swarzenski, Christopher M.; Vervaeke, William C.; Willis, Jonathan M.; Wilson, K. Van

    2017-01-01

    Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana’s network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change. PMID:28902904

  14. Assessing coastal wetland vulnerability to sea-level rise along the northern Gulf of Mexico coast: Gaps and opportunities for developing a coordinated regional sampling network

    USGS Publications Warehouse

    Osland, Michael J.; Griffith, Kereen T.; Larriviere, Jack C.; Feher, Laura C.; Cahoon, Donald R.; Enwright, Nicholas M.; Oster, David A.; Tirpak, John M.; Woodrey, Mark S.; Collini, Renee C.; Baustian, Joseph J.; Breithaupt, Joshua L.; Cherry, Julia A; Conrad, Jeremy R.; Cormier, Nicole; Coronado-Molina, Carlos A.; Donoghue, Joseph F.; Graham, Sean A.; Harper, Jennifer W.; Hester, Mark W.; Howard, Rebecca J.; Krauss, Ken W.; Kroes, Daniel; Lane, Robert R.; Mckee, Karen L.; Mendelssohn, Irving A.; Middleton, Beth A.; Moon, Jena A.; Piazza, Sarai; Rankin, Nicole M.; Sklar, Fred H.; Steyer, Gregory D.; Swanson, Kathleen M.; Swarzenski, Christopher M.; Vervaeke, William; Willis, Jonathan M; Van Wilson, K.

    2017-01-01

    Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana’s network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change.

  15. Assessing coastal wetland vulnerability to sea-level rise along the northern Gulf of Mexico coast: Gaps and opportunities for developing a coordinated regional sampling network.

    PubMed

    Osland, Michael J; Griffith, Kereen T; Larriviere, Jack C; Feher, Laura C; Cahoon, Donald R; Enwright, Nicholas M; Oster, David A; Tirpak, John M; Woodrey, Mark S; Collini, Renee C; Baustian, Joseph J; Breithaupt, Joshua L; Cherry, Julia A; Conrad, Jeremy R; Cormier, Nicole; Coronado-Molina, Carlos A; Donoghue, Joseph F; Graham, Sean A; Harper, Jennifer W; Hester, Mark W; Howard, Rebecca J; Krauss, Ken W; Kroes, Daniel E; Lane, Robert R; McKee, Karen L; Mendelssohn, Irving A; Middleton, Beth A; Moon, Jena A; Piazza, Sarai C; Rankin, Nicole M; Sklar, Fred H; Steyer, Greg D; Swanson, Kathleen M; Swarzenski, Christopher M; Vervaeke, William C; Willis, Jonathan M; Wilson, K Van

    2017-01-01

    Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana's network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change.

  16. Robustness of network of networks under targeted attack.

    PubMed

    Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo

    2013-05-01

    The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.

  17. Water Distribution System Deficiencies and Gastrointestinal Illness: A Systematic Review and Meta-Analysis

    PubMed Central

    Gruber, Joshua S.; Colford, John M.

    2014-01-01

    Background: Water distribution systems are vulnerable to performance deficiencies that can cause (re)contamination of treated water and plausibly lead to increased risk of gastrointestinal illness (GII) in consumers. Objectives: It is well established that large system disruptions in piped water networks can cause GII outbreaks. We hypothesized that routine network problems can also contribute to background levels of waterborne illness and conducted a systematic review and meta-analysis to assess the impact of distribution system deficiencies on endemic GII. Methods: We reviewed published studies that compared direct tap water consumption to consumption of tap water re-treated at the point of use (POU) and studies of specific system deficiencies such as breach of physical or hydraulic pipe integrity and lack of disinfectant residual. Results: In settings with network malfunction, consumers of tap water versus POU-treated water had increased GII [incidence density ratio (IDR) = 1.34; 95% CI: 1.00, 1.79]. The subset of nonblinded studies showed a significant association between GII and tap water versus POU-treated water consumption (IDR = 1.52; 95% CI: 1.05, 2.20), but there was no association based on studies that blinded participants to their POU water treatment status (IDR = 0.98; 95% CI: 0.90, 1.08). Among studies focusing on specific network deficiencies, GII was associated with temporary water outages (relative risk = 3.26; 95% CI: 1.48, 7.19) as well as chronic outages in intermittently operated distribution systems (odds ratio = 1.61; 95% CI: 1.26, 2.07). Conclusions: Tap water consumption is associated with GII in malfunctioning distribution networks. System deficiencies such as water outages also are associated with increased GII, suggesting a potential health risk for consumers served by piped water networks. Citation: Ercumen A, Gruber JS, Colford JM Jr. 2014. Water distribution system deficiencies and gastrointestinal illness: a systematic review and meta-analysis. Environ Health Perspect 122:651–660; http://dx.doi.org/10.1289/ehp.1306912 PMID:24659576

  18. Hazard Interactions and Interaction Networks (Cascades) within Multi-Hazard Methodologies

    NASA Astrophysics Data System (ADS)

    Gill, Joel; Malamud, Bruce D.

    2016-04-01

    Here we combine research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between 'multi-layer single hazard' approaches and 'multi-hazard' approaches that integrate such interactions. This synthesis suggests that ignoring interactions could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. We proceed to present an enhanced multi-hazard framework, through the following steps: (i) describe and define three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment; (ii) outline three types of interaction relationship (triggering, increased probability, and catalysis/impedance); and (iii) assess the importance of networks of interactions (cascades) through case-study examples (based on literature, field observations and semi-structured interviews). We further propose visualisation frameworks to represent these networks of interactions. Our approach reinforces the importance of integrating interactions between natural hazards, anthropogenic processes and technological hazards/disasters into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential, and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability between successive hazards, and (iii) prioritise resource allocation for mitigation and disaster risk reduction.

  19. Participatory flood vulnerability assessment: a multi-criteria approach

    NASA Astrophysics Data System (ADS)

    Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian

    2018-01-01

    This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  20. An Approach to Developing Local Climate Change Environmental Public Health Indicators in a Rural District.

    PubMed

    Houghton, Adele; Austin, Jessica; Beerman, Abby; Horton, Clayton

    2017-01-01

    Climate change represents a significant and growing threat to population health. Rural areas face unique challenges, such as high rates of vulnerable populations; economic uncertainty due to their reliance on industries that are vulnerable to climate change; less resilient infrastructure; and lower levels of access to community and emergency services than urban areas. This article fills a gap in public health practice by developing climate and health environmental public health indicators for a local public health department in a rural area. We adapted the National Environmental Public Health Tracking Network's framework for climate and health indicators to a seven-county health department in Western Kentucky. Using a three-step review process, we identified primary climate-related environmental public health hazards for the region (extreme heat, drought, and flooding) and a suite of related exposure, health outcome, population vulnerability, and environmental vulnerability indicators. Indicators that performed more poorly at the county level than at the state and national level were defined as "high vulnerability." Six to eight high vulnerability indicators were identified for each county. The local health department plans to use the results to enhance three key areas of existing services: epidemiology, public health preparedness, and community health assessment.

Top