143 resultados para Animal attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital dermatitis (DD) is a bacterial disease that primarily affects the skin on the heels of cattle. It is a major cause of lameness in dairy cows and a significant problem for the dairy industry in many countries, causing reduced animal welfare and economic loss. A wide range of infection levels has been found on infected farms, prompting investigations into both farm level and animal level risk factors for DD occurrence. There also appears to be individual variation between animals in susceptibility to the disease. The identification of factors affecting individual variation in susceptibility to DD might allow changes in breeding policies or herd management which could be used to reduce DD prevalence. Factors mentioned in the literature as possibly influencing individual variation in susceptibility to DD include physical factors such as hoof conformation and properties of the skin, physiological factors such as the efficacy of the immune response, and behavioural factors such as standing half in cubicles. Further work is required to determine the influence of these factors, identify the genetic basis of variation, clarify the level of heritability of DD susceptibility and to determine how this is correlated with production and health traits currently used in breeding programmes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The immune system comprises an integrated network of cellular interactions. Some responses are predictable, while others are more stochastic. While in vitro the outcome of stimulating a single type of cell may be stereotyped and reproducible, in vivo this is often not the case. This phenomenon often merits the use of animal models in predicting the impact of immunosuppressant drugs. A heavy burden of responsibility lies on the shoulders of the investigator when using animal models to study immunosuppressive agents. The principles of the three R׳s: refine (less suffering,), reduce (lower animal numbers) and replace (alternative in vitro assays) must be applied, as described elsewhere in this issue. Well designed animal model experiments have allowed us to develop all the immunosuppressive agents currently available for treating autoimmune disease and transplant recipients. In this review, we examine the common animal models used in developing immunosuppressive agents, focusing on drugs used in transplant surgery. Autoimmune diseases, such as multiple sclerosis, are covered elsewhere in this issue. We look at the utility and limitations of small and large animal models in measuring potency and toxicity of immunosuppressive therapies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.