924 resultados para collusion attack freeness
Resumo:
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.
Resumo:
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.
Resumo:
High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the issue of scalability of the detection process to higher network speeds. Using a proof of concept implementation we have shown how pre-onset IP addresses can be efficiently represented using a bit vector and used to modify a “white list” filter in a firewall as part of the mitigation strategy.
Resumo:
This special issue of Popular Communication examines the impact of the global financial crisis and recession on differnt aspects of global and regional media and the cultural industries, changing practices of media production, as well as media consumption, and the interplay of economic challenges and technological change.
Resumo:
Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up-scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.
Resumo:
Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.
Resumo:
Distributed Denial-of-Service (DDoS) attacks continue to be one of the most pernicious threats to the delivery of services over the Internet. Not only are DDoS attacks present in many guises, they are also continuously evolving as new vulnerabilities are exploited. Hence accurate detection of these attacks still remains a challenging problem and a necessity for ensuring high-end network security. An intrinsic challenge in addressing this problem is to effectively distinguish these Denial-of-Service attacks from similar looking Flash Events (FEs) created by legitimate clients. A considerable overlap between the general characteristics of FEs and DDoS attacks makes it difficult to precisely separate these two classes of Internet activity. In this paper we propose parameters which can be used to explicitly distinguish FEs from DDoS attacks and analyse two real-world publicly available datasets to validate our proposal. Our analysis shows that even though FEs appear very similar to DDoS attacks, there are several subtle dissimilarities which can be exploited to separate these two classes of events.
Resumo:
Background/aims: Access to appropriate health care following an acute cardiac event is important for positive outcomes. The aim of the Cardiac ARIA index was to derive an objective, comparable, geographic measure reflecting access to cardiac services across Australia. Methods: Geographic Information Systems (GIS) were used to model a numeric-alpha index based on acute management from onset of symptoms to return to the community. Acute time frames have been calculated to include time for ambulance to arrive, assess and load patient, and travel to facility by road 40–80 kph. Results: The acute phase of the index was modelled into five categories: 1 [24/7 percutaneous cardiac intervention (PCI) ≤1 h]; 2 [24/7 PCI 1–3 h, and PCI less than an additional hour to nearest accident and emergency room (A&E)]: 3 [Nearest A&E ≤3 h (no 24/7 PCI within an extra hour)]: 4 [Nearest A&E 3–12 h (no 24/7 PCI within an extra hour)]: 5 [Nearest A&E 12–24 h (no 24/7 PCI within an extra hour)]. Discharge care was modelled into three categories based on time to a cardiac rehabilitation program, retail pharmacy, pathology services, hospital, GP or remote clinic: (A) all services ≤30 min; (B) >30 min and ≤60 min; (C) >60 min. Examples of the index indicate that the majority of population locations within capital cities were category 1A; Alice Springs and Byron Bay were 3A; and the Northern Territory town of Maningrida had minimal access to cardiac services with an index ranking of 5C. Conclusion: The Cardiac ARIA index provides an invaluable tool to inform appropriate strategies for the use of scarce cardiac resources.
Resumo:
Talk of a possible Israeli strike on Iran’s nuclear facilities has re-ignited debate over the right of self-defence under international law. Some academics, including Anthony D'Amato and Alan Dershowitz, have claimed that an attack on Iran would be a permissible act of self-defence. Others, such as Kevin Jon Heller, argue that such action would be a clear breach of international law. So, who is correct? Would military action against Iran be legal or illegal?
Resumo:
This article reports on civil society in Australia between 1996 and 2007 related to former Prime Minister John Howard. The article discusses Howard's neo-conservative ideology and Liberal-National coalition, noting his views on political correctness. Howard's administration is also discussed in terms of immigration, multiculturalism, indigenous land rights, othering, and Islamaphobia. Information on the effect of Islamaphobia on Australian perceptions and the treatment of Muslims is also provided
Resumo:
Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.