298 resultados para DDOS ATTACKS
Resumo:
Atheromatous plaque rupture h the cause of the majority of strokes and heart attacks in the developed world. The role of calcium deposits and their contribution to plaque vulnerability are controversial. Some studies have suggested that calcified plaque tends to be more stable whereas others have suggested the opposite. This study uses a finite element model to evaluate the effect of calcium deposits on the stress within the fibrous cap by varying their location and size. Plaque fibrous cap, lipid pool and calcification were modeled as hyperelastic, Isotropic, (nearly) incompressible materials with different properties for large deformation analysis by assigning time-dependent pressure loading on the lumen wall. The stress and strain contours were illustrated for each condition for comparison. Von Mises stress only increases up to 1.5% when varying the location of calcification in the lipid pool distant to the fibrous cap. Calcification in the fibrous cap leads to a 43% increase of Von Mises stress when compared with that in the lipid pool. An increase of 100% of calcification area leads to a 15% stress increase in the fibrous cap. Calcification in the lipid pool does not increase fibrous cap stress when it is distant to the fibrous cap, whilst large areas of calcification close to or in the fibrous cap may lead to a high stress concentration within the fibrous cap, which may cause plaque rupture. This study highlights the application of a computational model on a simulation of clinical problems, and it may provide insights into the mechanism of plaque rupture.
Resumo:
Underground tunnels are vulnerable to terrorist attacks which can cause collapse of the tunnel structures or at least extensive damage, requiring lengthy repairs. This paper treats the blast impact on a reinforced concrete segmental tunnel buried in soil under a number of parametric conditions; soil properties, soil cover, distance of explosive from the tunnel centreline and explosive weight and analyses the possible failure patterns. A fully coupled Fluid Structure Interaction (FSI) technique incorporating the Arbitrary Lagrangian-Eulerian (ALE) method is used in this study. Results indicate that the tunnel in saturated soil is more vulnerable to severe damage than that buried in either partially saturated soil or dry soil. The tunnel is also more vulnerable to surface explosions which occur directly above the centre of the tunnel than those that occur at any equivalent distances in the ground away from the tunnel centre. The research findings provide useful information on modeling, analysis, overall tunnel response and failure patterns of segmented tunnels subjected to blast loads. This information will guide future development and application of research in this field.
Resumo:
Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
Migraine is a common episodic neurological disorder, typically presenting with recurrent attacks of severe headache and autonomic dysfunction. Apart from rare monogenic subtypes, no genetic or molecular markers for migraine have been convincingly established. We identified the minor allele of rs1835740 on chromosome 8q22.1 to be associated with migraine (P = 5.38 x 10(-)(9), odds ratio = 1.23, 95% CI 1.150-1.324) in a genome-wide association study of 2,731 migraine cases ascertained from three European headache clinics and 10,747 population-matched controls. The association was replicated in 3,202 cases and 40,062 controls for an overall meta-analysis P value of 1.69 x 10(-)(1)(1) (odds ratio = 1.18, 95% CI 1.127-1.244). rs1835740 is located between MTDH (astrocyte elevated gene 1, also known as AEG-1) and PGCP (encoding plasma glutamate carboxypeptidase). In an expression quantitative trait study in lymphoblastoid cell lines, transcript levels of the MTDH were found to have a significant correlation to rs1835740 (P = 3.96 x 10(-)(5), permuted threshold for genome-wide significance 7.7 x 10(-)(5). To our knowledge, our data establish rs1835740 as the first genetic risk factor for migraine.
Resumo:
Migraines are particularly common in young adults, with the prevalence reducing after the late 40s and early 50s years of age.1,2 Migraines are headaches that can have a throbbing or pulsating feeling, and often occur with nausea, vomiting, and sensitivity to light and sound. These headaches can last between a few hours to three days.1,3 They place a significant burden of disease on quality of life, and have a socio-economic impact through loss of productiveness and sick days.4 Most people report experiencing at least one migraine attack each month, with many reporting that migraine attacks interfered with their daily activities.2 Migraines have been ranked as the third most prevalent and seventh highest specific cause of disability around the world...
Resumo:
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between satellite phones and satellites. The keystream generator may be considered as a finite state machine, with an internal state of 81 bits. The design is based on four linear feedback shift registers, three of which are irregularly clocked. The keystream generator takes a 64-bit secret key and 19-bit frame number as inputs, and produces an output keystream of length between $2^8$ and $2^{10}$ bits. Analysis of the initialisation process for the keystream generator reveals serious flaws which significantly reduce the number of distinct keystreams that the generator can produce. Multiple (key, frame number) pairs produce the same keystream, and the relationship between the various pairs is easy to determine. Additionally, many of the keystream sequences produced are phase shifted versions of each other, for very small phase shifts. These features increase the effectiveness of generic time-memory tradeoff attacks on the cipher, making such attacks feasible.
Resumo:
Migraine is a complex neurological disorder with a well-documented genetic basis. Migraine is a product of allelic variation in genes of neurological, vascular and hormonal origin interacting with environmental triggers. Presentation can include attacks of head pain with symptoms of nausea, emesis, photophobia, phonophobia, and occasionally, visual sensory disturbances, known as aura. Migraine pain is difficult to ignore, associated with a deep sense of malaise and manifests as a throbbing, pulsatile headache, localized to one side of the head that intensifies with physical activity and that can last from 4-72 hours. Migraine is diagnosed according to criteria developed by the International Headache Society (IHS) and is subdivided into two main types based on the occurrence of aura symptoms that may be present in the early stages of the headache: migraine with aura (MA) and migraine without aura (MO). The majority (about 70%) of migraineurs are diagnosed with the MO subtype whilst the remaining 30% experience MA accompanied by neurological symptoms that manifest as fully reversible, visual, sensory and/or dysphasic speech disturbances in conjunction with their headache. Glutamate is the primary excitatory neurotransmitter in the central nervous system (CNS) and over-excitation of glutamate receptors is regarded as a contributing factor, through various mechanisms, to the pathology of migraine. In this chapter we present an overview of the pathophysiology and co-morbidity of migraine with other psychiatric disorders and discuss the role of the glutamatergic system in migraine, its molecular components as potential drug targets, in addition to the current treatments and progress of modulators of glutamatergic signaling.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
House loss during unplanned bushfires is a complex phenomenon where design, configuration, material and siting, can significantly influence the loss. In collaboration with the Bushfire Cooperative Research Centre the CSIRO has developed a tool to assess the vulnerability of a specific house at the urban interface. The tool is based on a spatial profiling of urban assets including their design, material, surrounding objects and their relationship amongst one another. The analysis incorporates both probabilistic and deterministic parameters, and is based on the impact of radiant heat, flame and embers on the surrounding elements and the structure itself. It provides a breakdown of the attributes and design parameters that contribute to the vulnerability level. This paper describes the tool which allows the user to explore the vulnerability of a house to varying levels of bushfire attacks. The tool is aimed at government agencies interested in building design, town planning and community education for bushfire risk mitigation.
Resumo:
An amorphous silicon carbonitride (Si1-x-yCxN y, x = 0:43, y = 0:31) coating was deposited on polyimide substrate using the magnetron-sputtering method. Exposure tests of the coated polyimide in atomic oxygen beam and vacuum ultraviolet radiation were performed in a ground-based simulator. Erosion kinetics measurements indicated that the erosion yield of the Si0.26C0.43N0.31 coating was about 1.5x and 1.8 × 10-26 cm3 /atom during exposure in single atomic oxygen beam, simultaneous atomic oxygen beam, and vacuum ultraviolet radiation, respectively. These values were 2 orders of magnitude lower than that of bare polyimide substrate. Scanning electron and atomic force microscopy, X-ray photoelectron spectrometer, and Fourier transformed infrared spectroscopy investigation indicated that during exposures, an oxide-rich layer composed of SiO2 and minor Si-C-O formed on the surface of the Si 0.26C0.43N0.31 coating, which was the main reason for the excellent resistance to the attacks of atomic oxygen. Moreover, vacuum ultraviolet radiation could promote the breakage of chemical bonds with low binding energy, such as C-N, C = N, and C-C, and enhance atomic oxygen erosion rate slightly.
Resumo:
Lana Nowakowski's opinion piece on the High Court decision in the Zaburoni HIV case attacks "Queensland's absurd necessity to prove intention on transmission" and argues that "changes to the law are long overdue". Both claims are wrong...
Resumo:
Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.